2014-2019 PP

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2060

Cambridge International Examinations

Cambridge International Advanced Subsidiary and Advanced Level


*7032462150*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

IB14 06_9713_13/4RP
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1 and 2

The WIMBA car company is planning to introduce a new family car and wishes to advertise it. It has
decided to create its own website rather than advertising using pop-ups on someone else’s website.

The company expects the website developers to work from home. This will enable the company to
save the cost of providing offices and paying running costs such as heating and electricity bills.

© UCLES 2014 9713/13/M/J/14


3

1 (a) There are three types of advertising: business, product and service advertising.

Name and describe the type of advertising that is used to promote the sales of a family car.

Name

Description

[3]

(b) Text is created using word processing software and imported into the website. This text could
be in the form of a description of the company.

Describe information (naming the type of software), which would be prepared using four
other different software packages before inclusion in the website.

[4]

© UCLES 2014 9713/13/M/J/14 [Turn over


4

(c) Describe three drawbacks to the company of using pop-ups.

[3]

(d) Describe three reasons why the company would use pop-unders rather than pop-ups.

[3]

© UCLES 2014 9713/13/M/J/14


5

(e) Apart from the drawbacks of using pop-ups, give four disadvantages to the company of
advertising on someone else’s website compared to creating their own website.

[4]

© UCLES 2014 9713/13/M/J/14 [Turn over


6

2 (a) Describe four benefits of working at home rather than working in an office from the point of
view of the employees.

[4]

(b) Apart from the running costs of the offices, describe three other ways that the company will
save money by having the employees working at home rather than working in the office.

[3]

© UCLES 2014 9713/13/M/J/14


7

Scenario 2
Questions 3, 4 and 5

The Queen Elizabeth Hospital uses computers to:

• help run its intensive care unit


• store patients’ records.

The hospital employs a number of office staff to deal with the storage of patient records. The staff all
have a duty of confidence.

The computers are not used to store details of medicines. When the nurses realise there is a shortage
of medicines they have to fax their official orders for new stock to the hospital pharmacy.

© UCLES 2014 9713/13/M/J/14 [Turn over


8

3 (a) Describe how computers are used to monitor the medical condition of patients in intensive
care.

[5]

(b) Describe four benefits of using computers for monitoring the patients.

[4]

© UCLES 2014 9713/13/M/J/14


9

4 Using this scenario, explain what is meant by a ‘duty of confidence’ with regard to patient
information.

[5]

5 Describe the features of a fax machine which allow the orders of new stock to be placed by the
nurse.

[3]

© UCLES 2014 9713/13/M/J/14 [Turn over


10

Scenario 3
Questions 6 and 7

Mikado’s is a chain of fast food restaurants. Each member of the sales staff is paid weekly depending
on how much time they have worked.

The payroll is a computerised system which also produces financial reports and exception reports.

Mikado’s is going to introduce a self-ordering system at all its restaurants so fewer sales staff will be
required. The working patterns of the remaining sales staff will be affected.

© UCLES 2014 9713/13/M/J/14


11

6 (a) Give three items of information, related to their pay, that will need to be stored on the master
file about each member of the sales staff.

[3]

(b) Give two items of information that will need to be stored about each member of the sales
staff on the transaction file in order that their wages can be calculated.

[2]

(c) The processing of the payroll is an example of batch processing.

Explain what is meant by batch processing.

[3]

© UCLES 2014 9713/13/M/J/14 [Turn over


12

(d) Give two advantages of batch processing compared with online processing.

[2]

(e) Using examples of data from the master and transaction files, describe the computer
processing used in the production of payments to the sales staff.

[5]

(f) Describe the features of financial reports and exception reports that might be produced by
the sales staff payroll system.

[3]

© UCLES 2014 9713/13/M/J/14


13

7 Name and describe three ways in which the staff working patterns, other than unemployment,
could change.

[6]

© UCLES 2014 9713/13/M/J/14 [Turn over


14

Scenario 4
Questions 8 and 9

Grafton mail order catalogue company currently operates by receiving orders from its customers by
phone. They are going to extend the way they receive orders by having an online system.

Each customer has a customer ID. This consists of ten digits.

Grafton has employed Oscar, a systems analyst, to oversee the introduction of the new system. To
begin with he will analyse the existing system.

After designing and developing the system Oscar will need to test it.

© UCLES 2014 9713/13/M/J/14


15

8 (a) Give three advantages to Grafton of introducing online shopping.

[3]

(b) Give three disadvantages to customers of online shopping.

[3]

© UCLES 2014 9713/13/M/J/14 [Turn over


16

9 (a) After organising the results of his research, Oscar will need to complete the analysis of the
existing system.

Identify three stages he will need to complete to do this.

[3]

(b) Before it is completed the system will need to be tested.

Describe three validation rules that could be used on the customer ID and for each one, give
an example of data that could be used to test whether it works or not.

Rule 1

Rule 2

Rule 3

[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/13/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Subsidiary Level and GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED INFORMATION & COMMUNICATION


TECHNOLOGY
9713/13 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13

1 (a) Product [1]

Two from:
Advertising a specific product
Advertising one item such as a specific model of a car
Not the whole range of cars the company sells/not the company itself
Target audience is identified…
… and an advertising campaign that will appeal to that type of audience is created
Media is decided upon [2]

(b) Four from:


Statistical tables and graphs showing company sales/profits/progress could be created using
spreadsheet software
Files of data/reports of sales/profits/progress could be created using database software
Images of the company could be scanned using scanning software
Images/photos of company personnel/head office buildings/latest model could be edited by
picture/photo editing software/graphics software
Voiceovers describing products or introducing the company/background music could be
edited by music/audio editing software
Videos of company personnel/head office buildings/latest model could be edited by video
editing software
Slides with information introducing the new model could be produced using presentation
software [4]

(c) Three from:


Discontented consumer may avoid that organisation in future
Many computer users now have pop-up blocking software
Many users just close the pop up without reading it/ignore it
Pop ups are considered to be a hindrance/distraction/annoyance [3]

(d) Three from:


Customers don’t instantly remove them
Don’t appear to users until they close a window so less likely to remove them/ Don’t appear
to users until they close a window so more likely to read them
They are not removed by pop-up blocking
Consumer regards pop-unders as less of a hindrance than pop-ups [3]

(e) Four from:


Can make their own website better suited to their needs
Own website will target their audience better
Own website has shorter delay in updating/improving advertising/easier to update/improve
Company doesn’t have as much control over the host’s website as it would over its own
May be many other companies’ advertising on someone else’s website
The company’s entry may not be seen/someone else’s website might not be popular
Not as much advertising can be used/limited space available [4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13

2 (a) Four from:


If the website designer is disabled it’s easier for him/her as he/she doesn’t have to travel
Time is not wasted travelling/ more free time because of less travelling
Can spend more time with their family/can arrange their work schedule to suit themselves
Don’t have to live close to the company so can live in area of their choice
Don’t have to spend money on fuel/transport travelling to work
Don’t have the stress of travelling to work in rush hour [4]

(b) Three from:


More likely to retain staff so don’t have to spend money on retraining
Don’t have to pay travelling expenses for conferences
Less need for land for car parking space so some land could be sold off
Any other reasonable description of lower costs [3]

3 (a) Five from:


Patients condition is monitored using computer and sensors
Sensors used to monitor blood pressure, pulse rate, body temperature (must mention at least
two)
Sensors feed back body functions to the microprocessor/computer
Values are converted from analogue to digital
Computer is pre-set with the normal range of values
Computer is (constantly) comparing the data fed back by the sensors…
…..to these pre-set values
If any data is outside the pre-set range the computer sends a signal to sound an alarm
The process is continuous [5]

(b) Four from:


Can monitor continuously/readings can be taken more frequently
Nurses can get tired and forget to take readings/nurses are so busy they might not be able to
take readings regularly
Computer readings are more accurate than nurses/human errors are reduced
More than one variable can be measured at any one time
Results can be analysed automatically/Charts are produced automatically
Automatic warnings can be generated/computers are faster to react
A computer can monitor the condition of several patients at the same time leaving nurses
free to do other tasks
Reduces chances of nurses being exposed to contagious diseases
Reduced cost of wage bill/fewer nurses will be needed [4]

4 Five from:
Office staff have a duty of confidence to patients and hospital
They must not tell anybody about the details of patients records without the patient’s/hospital’s
permission
Patient’s could take out a legal injunction if office staff attempt to give out their information without
their permission
Office staff will have been told to treat the information as confidential
Or it must be obvious to them that the information has been given/obtained in confidence
Best way to achieve confidentiality is for hospital to get office staff to sign a confidentiality
agreement. [5]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13

5 Three from:
Fax machine is connected to a phone line
Has a number pad which allows pharmacy’s fax machine number to be dialled
Has an inbuilt scanner to scan hard copy faxes/scan the order…
… which is transmitted through phone lines
Pharmacy’s fax machine has an inbuilt printer which allows the order to be printed [3]

6 (a) Three from:


Tax history
National Insurance history
Pay so far this year
Pension contributions
Rate of pay
Tax code
Bank details
Payment method [3]

(b) Two from:


ID/Workers Number
Hours worked [2]

(c) Three from:


Data is collected together in a transaction file
In the course of the week
It is processed in one go with the master file
To produce payslips (usually overnight)
Without human intervention [3]

(d) Two from:


For large systems the hardware required for batch processing can be cheaper than that in an
on-line system
Batch processing can be carried out at a time when the computer would not normally
be used
A company can get more work out of the computer hardware it owns
Batch processing moves the time of processing to when the computing resources are
less busy
Batch processing requires less human supervision [2]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13

(e) Five from:


At the end of each week…
…transaction file is sorted into same order as master file
Sorted on employee number
First record in the transaction file is read
First record in the old master file is read
Computer calculates the pay
Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts these from total pay
Processed record is written to new master file
Process is repeated until end of old master file
Master file is updated
Payslips are printed [5]

(f) Three from:


Financial reports describe financial information about employees
Financial reports detail information by department or all employees
Financial reports detail payments made to employees
Financial reports detail amounts deducted from employees
Exception reports are usually reports about errors produced by the system usually as a result
of validation rules having been broken
Exception reports usually refer to individual employees

Must have at least one feature of each to gain full marks [3]

7 Three names and descriptions from:


Part time working
Working a limited number of hours/working less than the normal working hours of a full time
employee

Flexible working hours


Workers choose the time of day they want to work (but work the same number of hours every
week)

Job sharing
Two (or more) workers doing the job of one worker (working full time)

Compressed hours
Working for same number of hours as a normal working week but over fewer days [6]

8 (a) Three from:


They can employ fewer staff and pay less in staff wages
Don’t have to pay as much in running costs such as electricity, heating/air conditioning and
lighting at call centres
Because of their lower costs, they can offer cheaper goods thus attracting more customers
Shoppers can shop 24/7 so company could gain increased profits
Internet more likely to attract customers worldwide increasing profits [3]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 13

(b) Three from:


Security concerns about data transmitted over internet such as hacking, phishing, pharming,
spyware, viruses, malware
Description of phishing
Description of pharming
Can order goods and they don't get delivered
Goods are not to the same standard as those ordered
Can’t check the standard of goods before buying
May be hidden costs such as delivery charges
Description of viruses
Expense of buying a computer with a broadband internet connection [3]

9 (a) Three from:


Establishing the inputs, outputs and processing in the current/existing system
Recording information about the current/existing system
Identifying problems with the current/existing system
Identifying suitable hardware and software for a new system
Identifying the user and information requirements [3]

(b) Three matched pairs from:


Invalid character check which would check that only digits have been entered
Example – any sequence of non-numeric data

Check digit – produced by performing calculation on the ten digits


Example – transposing any two digits

Length check which would check that length is exactly ten characters
Example any string fewer or more than ten characters

Range check which would check that id is >999999999 and less than 10000000000
Example any number >999999999 or less than 10000000000

Format/picture check on student number so that all 10 characters are numeric


Example 10 characters containing one or more non-numeric characters [6]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
*5937586283*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

IB14 06_9713_31/2RP
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1 to 4

Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.

PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.

E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.

The airline has a call centre open 24 hours, every day, to deal with customer queries.

PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.

PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.

© UCLES 2014 9713/31/M/J/14


3

1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.

[3]

(b) Describe four steps that a customer would follow when booking flights using PEA’s website.

[4]

(c) Describe what is meant by an electronic ticket.

[1]

© UCLES 2014 9713/31/M/J/14 [Turn over


4

(d) Describe four advantages to a customer of booking an airline ticket online.

[4]

© UCLES 2014 9713/31/M/J/14


5

2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.

[2]

(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.

[6]

(c) The airline call centre uses Computer Telephony Integration (CTI) software.

Describe two features of CTI software that would be useful to the airline.

[2]

© UCLES 2014 9713/31/M/J/14 [Turn over


6

3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.

[6]

(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.

[3]

© UCLES 2014 9713/31/M/J/14


7

4 Explain how Gordon could use a computer model to manage the company finances.

[6]

© UCLES 2014 9713/31/M/J/14 [Turn over


8

Scenario 2
Questions 5 to 7

International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.

Customers can access their accounts either at a branch or by online banking via the bank’s website.

The website can be used by disabled customers with suitably configured computers.

The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.

© UCLES 2014 9713/31/M/J/14


9

5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.

[5]

(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.

[3]

© UCLES 2014 9713/31/M/J/14 [Turn over


10

6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.

[6]

© UCLES 2014 9713/31/M/J/14


11

7 (a) Describe in detail the use of five components of an expert system for financial planning.

[5]

(b) Describe two benefits to the bank of using an expert system.

[2]

(c) Describe two drawbacks to the bank of using an expert system.

[2]

© UCLES 2014 9713/31/M/J/14 [Turn over


12

Scenario 3
Questions 8 to 10

A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.

The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.

The school uses a VPN to enable teachers to access the school network from home.

© UCLES 2014 9713/31/M/J/14


13

8 Describe five ways in which the school’s computers could be used to improve the students’
learning.

[5]

9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.

[6]

© UCLES 2014 9713/31/M/J/14 [Turn over


14

10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.

Device 1

Device 2

Device 3

[6]

(b) Explain what is meant by a VPN.

[3]

© UCLES 2014 9713/31/M/J/14


15

BLANK PAGE

© UCLES 2014 9713/31/M/J/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/31/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/31 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

1 (a) Three descriptions from:

Online check in for flight choice of (available) flight times/destinations


Seating choices/reserve seating for flights
Hotel room reservation for accommodation
Car rental reservation at destination airport travel insurance
Special meal requests on board flight
Special requirements for disabled travellers
Chaperones bookings for children travelling alone
Frequent flyer/loyalty scheme for discounts/facilities [3]

(b) Four from:

Choose home country/select choice of departure airport


Choose destination country/select choice of destination airport
Select flight departure date from dropdown list/ calendar
Select flight departure time from dropdown list/ calendar
Select/choose connection times
Select flight return date from dropdown list
Select flight return time from dropdown list
Select number of travellers
Select type of seat/class of travel
Submit to check availability
Enter details of each traveller
Select payment method and submit payment details
Print/download confirmation details/tickets [4]

(c) One from:

Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]

(d) Four from:

Travel opportunities/availability can be researched at any time and at own pace


Quickly compare prices and facilities of flights
Prices may be cheaper online/online offers available
Bookings can be made at any time
Bookings can be made from anywhere with internet connection
Bookings can be made quicker than via the telephone or personal visit to airline
No chance of double bookings
Immediate confirmation of booking/information about unavailability of flights can be
(re-) printed by customer/airline at any time so ticket cannot be lost [4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

2 (a) Two from:

Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]

(b) Advantages from:

No need to go to travel agents


Assistance always available
Can access assistance from anywhere/use mobile devices

Disadvantages from:

No direct personal contact with airline personnel


Use of untrained/non-expert operators
May not be treated as urgent/centre may screen the call and not answer immediately
Touch tone/menu system may be complicated/difficult to use
Long waits for call to be answered
May be asked the same information several times
Need access to a telephone/mobile or cell phone
People with (hearing) disabilities may find using call centres difficult
(Regional) accents of operators may be difficult to understand

Maximum 4 marks if all advantages or all disadvantages. [6]

(c) Two from:

Can queue calls waiting for attention


Can route calls to next available operative
Displays caller number
Combines voice and data input to the computer system
Supervisor can intervene in call [2]

3 (a) Three descriptions from:

Sensors to detect e.g. movements large/high resolution


monitors...to display video/images of simulations
Joystick/yoke to move items/change direction
Headphones/set to output audio/hear instructions or warnings
Loudspeakers to produce ambient sounds
Microphone/headset microphone to input sound/voice [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

(b) Three descriptions from:


Not real so safer/safety/no danger of being hurt/not so stressed as using a real aircraft
Unusual scenarios can be rehearsed/practised
Can practise/revisit different scenarios/situations/specific aspects of flying aircraft
Can practice take-off/landings at particular airports
Can record/replay actions taken to check progress [3]

4 Descriptions from:

Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]

5 (a) Five from:

Site navigation via menus physically disabled people


Reading text is difficult for visually impaired
Understanding images/plans/layout is difficult for visually impaired
Poor choice of colours/contrasts/too many animations is difficult for visually impaired
Following commentaries/audio instructions/movie or video soundtracks is difficult for hearing
impaired
Understanding instructions is difficult for people with cognitive impairment/learning difficulties
Understanding banking process is difficult for people with cognitive impairment/learning
difficulties
[5]
(b) Software configurations could include e.g.:

Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

6 Explanations from:

Use of customer ID to identify user


Use of PIN known only to customer
Ask for random digits (from PIN)/characters from password
Use of image as “SiteKey” known only to user
Use of card reader using customer bank card to generate unique TAN
Biometrics unique to individual
Security question/answer known only to individual
Use of digital certificate to ensure customer is genuine [6]

7 (a) Five from:

User interface for input of question/query


using multiple choice items
allow entry of customer’s financial details
Explanation system to show how to use the advice system
Knowledge base editor to enter/amend current financial facts e.g. tax rates/allowances
Database of facts/knowledge base to hold/store current financial data e.g. tax rules
Rules base to hold/store financial “rules”
Inference engine to interrogate database and rules [5]

(b) Two from:

Expert systems do not forget details but humans may do so


Copies of expert systems can be made but training humans takes time
Expert system advice is more consistent but human advice may not be the same
Expert systems give better advice than humans because it is based on the knowledge of
many experts
Can be more efficient than humans when dealing with many cases/customers
More consistent with advice/decisions than humans
Documentation is produced automatically
Fraud/errors are reduced [2]

(c) Two from:

Humans can apply judgments/common sense but expert systems cannot


Humans can be creative in unusual situations but expert systems cannot
Humans can learn from experience but expert systems have to be reprogrammed
Experts systems do not recognise when there is no preferred outcome/solution to a financial
problem
Costs of installation/costs of training personnel to use it [2]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

8 Five from e.g.:

Use of presentations/slideshow software to enhance lectures/lessons


Monitor progress with online tests
Use of CAL to allow individual learning
Use of CBT to allow learning at own pace
Use of internet access for research
Use for collaborative learning
Use of computers in formative assessment [5]

9 Six from e.g.:

Use of database software to keep records of work done


Use of spreadsheet software to analyse test marks
Use spreadsheet/database/data manipulation to display progress as graphs or tables
Use word-processing software to write reports on students and letters to parents
Use mail-merge to create batches of reports
Use of email to report progress of individual students
Social networks/SMS/text message to communicate with students/parents about general
student/school progress [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 31

10 (a) Three devices from, max two marks for each:

Network card (NIC):


Has unique MAC address
Connects physical layer with data link layer
Checks address of received packet to see if it should pass it up to host computer
Prepares data packet for sending along media
Hub:
Receives and broadcasts packets to all devices connected to it
Switch:
Receives packets and sends packets only to their specified destination
Router:
Connects networks together/LAN to WAN
Forwards a data packet to its destination on another network
Modem:
Converts analogue signals to/from digital signals for modulation/demodulation onto carrier
waves so that ordinary telephone systems can be used
Bridge:
Connects multiple network segments
Translates packets to/from different network protocols
Repeater:
Reconstitutes and sends packets to next segment of network [6]

Guidance: 1 mark for device


1 mark for description

Description must match device.

(b) Three from:

Virtual Private Network


Uses public communications networks such as internet
To provide remote access to a central company network
Users require authentication to use it
Use of data encryption when transferring data
Use of “tunnels/tunnelling” (over public networks) [3]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
*9959819298*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

IB14 06_9713_11/5RP
© UCLES 2014 [Turn over
2

Scenario 1
Question 1, 2, 3 and 4

Dubai Airways (DA) is a company which carries passengers from all parts of the world to Dubai.

DA’s computer system needs updating.

It issues e-tickets which have a bar code and the flight details.

After flights, DA invites each passenger to complete a form giving their opinions about the flight. As
part of the system update DA have asked the systems analyst, Li, to design a new form. The
company is undecided whether the data on the form should be captured using Optical Character
Recognition (OCR) or Optical Mark Recognition (OMR).

As Li develops the new system, she will supervise the testing.

The new system will be evaluated after testing is completed.

Li will provide DA with documentation about the system.

© UCLES 2014 9713/11/M/J/14


3

1 Validation is used to check that data input into DA’s system is reasonable. For each statement
below, tick the most appropriate answer.

(a) The most appropriate use of a check digit would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

(b) The most appropriate use of a format check would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

(c) The most appropriate use of a range check would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

© UCLES 2014 9713/11/M/J/14 [Turn over


4

2 Tick the four statements which are true when referring to the testing of DA’s new system.

True


Live data is test data that has never been used before

Abnormal data would be 500 passengers on a flight with 300 seats

Live data is test data for which the results are already known

Extreme data would be 300 passengers on a flight with 300 seats

Extreme data is data of the wrong data type for the field concerned

Normal data is data that is within a given range

Abnormal data is data of the correct type for the field concerned

All data that is not abnormal is extreme

Testing will not indicate where improvements can be made

Modules are never adjusted as a result of testing

[4]

© UCLES 2014 9713/11/M/J/14


5

3 (a) After the system has been tested Li will need to produce an evaluation. Describe three
stages involved in the evaluation of such a system.

Stage 1

Stage 2

Stage 3

[3]

(b) Name two types of technical documentation and for each one describe two examples of its
contents.

Type of documentation 1:

Content 1:

Content 2:

Type of documentation 2:

Content 1:

Content 2:

[6]

© UCLES 2014 9713/11/M/J/14 [Turn over


6

4 (a) Identify three different features of a well-designed paper based form that will make it easier
for a passenger to fill in. For each feature, state whether OMR or OCR would be the most
appropriate method of input to a computer.

[3]

(b) Discuss the advantages and disadvantages of OMR compared with OCR.

[5]

© UCLES 2014 9713/11/M/J/14


7

Scenario 2
Questions 5, 6 and 7

Midtown Bank in the UK operates an online banking service. A number of customers are concerned
about the privacy and security of their data.

This system means that bank employees have access to the personal details of customers of the
bank. There are social and ethical implications which can arise because of this.

As the number of customers using their online banking service has increased, there are fewer
customers visiting local branches. This has led to some of the branches closing.

© UCLES 2014 9713/11/M/J/14 [Turn over


8

5 (a) Describe the following security issues associated with online banking.

Phishing

[2]

Pharming

[2]

Spyware

[2]

© UCLES 2014 9713/11/M/J/14


9

(b) Apart from security issues, describe three drawbacks to customers of using online banking.

[3]

(c) Describe three benefits to the bank of online banking.

[3]

© UCLES 2014 9713/11/M/J/14 [Turn over


10

6 (a) Anonymised and aggregated information are two ways customer information can be
summarised to safeguard its confidentiality.

Describe what is meant by the two terms:

Anonymised information

Aggregated information

[2]

(b) Describe two ways that aggregated information would be useful to the bank.

[2]

(c) Apart from the need to use anonymised and aggregated information explain the
responsibilities of the bank when safeguarding the privacy of customers’ data.

[5]

© UCLES 2014 9713/11/M/J/14


11

7 As bank branches have closed, changes in working patterns have occurred as well as changes in
employment status. Describe three of the changes to working patterns.

[3]

© UCLES 2014 9713/11/M/J/14 [Turn over


12

Scenario 3
Question 8

Mrs Sharif is the head teacher of a large school with over 2000 students.

Teachers keep records of test scores on the school’s computer system. The total possible mark for
each test varies from test to test and subject to subject.

Mrs Sharif wants the teachers to use the test scores of each student so that they can be included in a
report to the student’s parents. She will need to choose a suitable printer for printing the reports.

© UCLES 2014 9713/11/M/J/14


13

8 (a) Give four features of spreadsheet software which would be used by a teacher to analyse the
test results of the students and for each feature give a use for it.

Feature 1

Use 1

Feature 2

Use 2

Feature 3

Use 3

Feature 4

Use 4

[8]

(b) Give three advantages to a teacher of using spreadsheets rather than manually analysing
test results.

[3]

© UCLES 2014 9713/11/M/J/14 [Turn over


14

(c) Describe three features of word processing software that you could use to include the
analysed data in the typed reports.

[3]

(d) Mrs Sharif wants to use a laser printer to print the reports. Give two reasons why she has
chosen a laser printer rather than other types of printer.

[2]

© UCLES 2014 9713/11/M/J/14


15

Scenario 4
Questions 9, 10 and 11

RockICT has a computerised payroll system. Sequential files are used for the master and transaction
files.

Workers are paid on a weekly basis depending on how many hours they work. Batch processing is
used to run the payroll.

Because the system is computerised the payroll office workers are allowed to work from home.

© UCLES 2014 9713/11/M/J/14 [Turn over


16

9 (a) Give three reasons why the company would want their payroll workers to work at home
rather than in the office.

[3]

(b) Describe three reasons why the payroll workers would want to work at home rather than in
the office.

[3]

© UCLES 2014 9713/11/M/J/14


17

10 (a) Describe what is meant by an unordered sequential file.

[1]

(b) Describe what is meant by batch processing,

[3]

© UCLES 2014 9713/11/M/J/14 [Turn over


18

11 Describe six steps in the weekly updating of the payroll master file.

[6]

© UCLES 2014 9713/11/M/J/14


19

BLANK PAGE

© UCLES 2014 9713/11/M/J/14


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/11/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Subsidiary Level and GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED TECHNOLOGY AND


COMMUNICATION TECHNOLOGY
9713/11 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

1 (a)
Number of passengers

A bar code number 

A flight number (consisting of two letters followed by three digits)

Name of destination
[1]

(b)
Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits) 

Name of destination
[1]

(c)
Number of passengers 

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination
[1]

2
Live data is test data that has never been used before

Abnormal data would be 500 passengers on a flight with 300 seats 

Live data is test data for which the results are already known 

Extreme data would be 300 passengers on a flight with 300 seats 

Extreme data is data of the wrong data type for the field concerned

Normal data is data that is within a given range 

Abnormal data is data of the correct type for the field concerned

All data that is not abnormal is extreme

Testing will not indicate where improvements can be made

Modules are never adjusted as a result of testing


[4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

3 (a) Three from:

Using test results to evaluate the solution


Obtaining feedback from the user
(using the results of user feedback/test results) to identify limitations
Using knowledge of the limitations to make improvements
Discussing with managers whether new system has met original objectives [3]

(b) Systems documentation – one mark

Two from:

The results of the systems analysis/dfd diagrams


What is expected of the system/purpose of the system
Overall design decisions such as the choice of hardware and software
Overall design decisions such as file, input and output structures
Test data/test plans so that systems analyst can see the results of these/test results
Systems flowcharts

Program documentation – one mark

Two from:

Description of the software/purpose of the software


Reasons for choosing those pieces of existing software that were used instead of the
programmer having to write code
Input/output data formats
Program flowcharts/algorithm
Program listing – a complete copy of the code used with annotation explaining what each
module of code does
Notes that will help any future programmer to make modifications to the system [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

4 (a) Three from:

Tick boxes which would be suitable for OMR


Strike throughs/lozenges would be suitable for OMR
Multi choice options would be suitable for OMR
Individual character boxes more suitable for OCR [3]

(b) Five from:

Doesn’t matter whether the handwriting is poor with OMR


OMR would need more detailed instructions for the passenger
OMR does not allow extended answers
OMR reading is a more accurate process/fewer mistakes
OCR can be used to read text anywhere/does not rely on reading forms
OMR is a faster method of input
OMR forms are easier to complete than OCR

Must have at least one each from OMR and OCR to gain full marks
One mark is available for a reasoned conclusion [5]

5 (a) Phishing
Two from:
E-mail appear to be from customer's bank
Ask for customer’s details – password, card/account number, other security details
E-mail makes up plausible reason
Can include a link/website address for customer to go to which looks just like the actual
bank’s website but is a fake website

Pharming
Two from:
Installs a piece of malicious software/code on customer’s computer
Fraudster redirects genuine website’s traffic to own website
Customer is now sending personal details to fraudster’s website

Spyware
Two from:
Downloaded/software used to gather user's key presses
Software detects key presses of user logging on to bank site [6]

(b) Three from:

Expense of buying a computer with a broadband internet connection


Unable to make cash deposits or withdraw cash without physically going to the bank
or to an ATM
May not like it that the bank is not providing the ‘personal touch’
May mismanage accounts as it is so easy to transfer money from one account to another [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

(c) Three from:

Save costs as don’t have to rent so many high street premises


Employ fewer staff therefore less paid in staff wages
Save costs of printing/sending statements
Lower running costs, fewer branches so less electricity, heating and lighting
Because of lower costs can offer higher rates of interest for savers and lower rates
of interest for borrowers…
…these rates attract more customers
Less likelihood of the bank being robbed
Less money is spent as there are fewer security staff [3]

6 (a) Anonymised information:


Information about individuals without mentioning the person by name [1]

Aggregated information:
Personal details of individuals are combined to provide information without naming
those individuals [1]

(b) Two from

Can identify the number of customers from a specific area


Can identify the number of customers who have overdrafts
Can identify the number of customers who have deposits greater than a certain sum [2]

(c) Five from:

Information must be kept secure


Must abide by data protection rules
Employees must not share any customer data with anybody outside the organisation
Employees should sign a confidentiality agreement/have a duty of confidence
Employees should have a duty of fidelity
Information about an individual should not be passed from one organisation to
another without permission of the individual [5]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

7 Three from:

Some workers may have to/will have the opportunity to go part time
There will be the opportunity to job share
There will be the opportunity for flexible working hours
There will be the opportunity to work compressed hours
Workers will need to have the ability to move from branch to branch [3]

8 (a) Four matched pairs from:

Conditional formatting
Cells are coloured differently to indicate acceptable progress or otherwise

Graphs/charts
Comparison of student’s chart with target grades/class average/previous scores/gradient
of the graph shows whether there is improvement or not

Calculate average score of student


Comparison of student’s score with average/comparison of student’s score with target
grades

Maximum function
Could see which was highest mark and when

Minimum function
Could see which was lowest mark and when

Sorting/filtering
To produce a rank order of students + reason – for the purpose of grading/setting/to list
best/worst performing students/students achieving a particular mark range/grade so that
these students can be set suitable targets

Goal seek
Could see what test results required to achieve satisfactory average [8]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

(b) Three from:

Results will be calculated more quickly/graphs produced more quickly


Results will be displayed more neatly
Results will be calculated more accurately
Validation can be incorporated
Results can be exported directly into a report/document
Easier to manipulate data
Easier to edit data/errors
Focus on specific areas more easily [3]

(c) Three from:

Import/insert data from spreadsheet


Copy and paste chart from spreadsheet
Link to data/spreadsheet
Mailmerge to insert grades/marks/name of student [3]

(d) Two from:

Inkjet unsuitable for bulk printing


Don’t have to keep changing cartridges like an inkjet
Faster to print multiple copies than inkjet or dot matrix
Dot matrix quality is not good enough [2]

9 (a) Three from:

Don’t have to spend so much on utilities


Increased productivity due to more content workforce/improved motivation
More likely to retain staff so don’t have to spend money on retraining
Lower costs as can rent smaller/fewer offices
Don’t have to pay travelling expenses for conferences
Less need for land for car parking space so some land could be sold off [3]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 11

(b) Three from:

Time is not wasted travelling/ more free time because of less travelling
Can spend more time with their family/can arrange their work schedule to suit themselves
Don’t have to live close to the company so can live in area of their choice
Don’t have to spend money on fuel/transport travelling to work
Don’t have the stress of travelling to work in rush hour
If the payroll worker is disabled it’s easier for him/her as he/she doesn’t have to travel [3]

10 (a) With no thought given to the order/data has not been sorted/stored in the order they are
added [1]

(b) Three from:


Data is collected together in a transaction file
In the course of the week
It is processed in one go with the master file
To produce payslips (usually overnight)
Without human intervention [3]

11 Six from:

The transaction file is sorted in the same order as the master file
Sorted on employee number
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out

Then
If transaction relates to calculation of pay:
Computer calculates the pay
Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts this from total pay
Processed record is written to master file
Process is repeated until end of old master file

If transaction relates to deletion, amendment or insertion:


If deletion or amendment old master file record not written to file
If amendment/insertion data in transaction file written to master file
Process is repeated until end of old master file
Remaining records of the transaction file are added to the master file [6]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
*4031985797*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

IB14 06_9713_12/FP
© UCLES 2014 [Turn over
2

Scenario 1
Question 1, 2, 3 and 4

Dubai Airways (DA) is a company which carries passengers from all parts of the world to Dubai.

DA’s computer system needs updating.

It issues e-tickets which have a bar code and the flight details.

After flights, DA invites each passenger to complete a form giving their opinions about the flight. As
part of the system update DA have asked the systems analyst, Li, to design a new form. The
company is undecided whether the data on the form should be captured using Optical Character
Recognition (OCR) or Optical Mark Recognition (OMR).

As Li develops the new system, she will supervise the testing.

The new system will be evaluated after testing is completed.

Li will provide DA with documentation about the system.

© UCLES 2014 9713/12/M/J/14


3

1 Validation is used to check that data input into DA’s system is reasonable. For each statement
below, tick the most appropriate answer.

(a) The most appropriate use of a check digit would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

(b) The most appropriate use of a format check would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

(c) The most appropriate use of a range check would be to ensure the validity of:

Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination

[1]

© UCLES 2014 9713/12/M/J/14 [Turn over


4

2 Tick the four statements which are true when referring to the testing of DA’s new system.

True


Live data is test data that has never been used before

Abnormal data would be 500 passengers on a flight with 300 seats

Live data is test data for which the results are already known

Extreme data would be 300 passengers on a flight with 300 seats

Extreme data is data of the wrong data type for the field concerned

Normal data is data that is within a given range

Abnormal data is data of the correct type for the field concerned

All data that is not abnormal is extreme

Testing will not indicate where improvements can be made

Modules are never adjusted as a result of testing

[4]

© UCLES 2014 9713/12/M/J/14


5

3 (a) After the system has been tested Li will need to produce an evaluation. Describe three
stages involved in the evaluation of such a system.

Stage 1

Stage 2

Stage 3

[3]

(b) Name two types of technical documentation and for each one describe two examples of its
contents.

Type of documentation 1:

Content 1:

Content 2:

Type of documentation 2:

Content 1:

Content 2:

[6]

© UCLES 2014 9713/12/M/J/14 [Turn over


6

4 (a) Identify three different features of a well-designed paper based form that will make it easier
for a passenger to fill in. For each feature, state whether OMR or OCR would be the most
appropriate method of input to a computer.

[3]

(b) Discuss the advantages and disadvantages of OMR compared with OCR.

[5]

© UCLES 2014 9713/12/M/J/14


7

Scenario 2
Questions 5, 6 and 7

Midtown Bank in the UK operates an online banking service. A number of customers are concerned
about the privacy and security of their data.

This system means that bank employees have access to the personal details of customers of the
bank. There are social and ethical implications which can arise because of this.

As the number of customers using their online banking service has increased, there are fewer
customers visiting local branches. This has led to some of the branches closing.

© UCLES 2014 9713/12/M/J/14 [Turn over


8

5 (a) Describe the following security issues associated with online banking.

Phishing

[2]

Pharming

[2]

Spyware

[2]

© UCLES 2014 9713/12/M/J/14


9

(b) Apart from security issues, describe three drawbacks to customers of using online banking.

[3]

(c) Describe three benefits to the bank of online banking.

[3]

© UCLES 2014 9713/12/M/J/14 [Turn over


10

6 (a) Anonymised and aggregated information are two ways customer information can be
summarised to safeguard its confidentiality.

Describe what is meant by the two terms:

Anonymised information

Aggregated information

[2]

(b) Describe two ways that aggregated information would be useful to the bank.

[2]

(c) Apart from the need to use anonymised and aggregated information explain the
responsibilities of the bank when safeguarding the privacy of customers’ data.

[5]

© UCLES 2014 9713/12/M/J/14


11

7 As bank branches have closed, changes in working patterns have occurred as well as changes in
employment status. Describe three of the changes to working patterns.

[3]

© UCLES 2014 9713/12/M/J/14 [Turn over


12

Scenario 3
Question 8

Mrs Sharif is the head teacher of a large school with over 2000 students.

Teachers keep records of test scores on the school’s computer system. The total possible mark for
each test varies from test to test and subject to subject.

Mrs Sharif wants the teachers to use the test scores of each student so that they can be included in a
report to the student’s parents. She will need to choose a suitable printer for printing the reports.

© UCLES 2014 9713/12/M/J/14


13

8 (a) Give four features of spreadsheet software which would be used by a teacher to analyse the
test results of the students and for each feature give a use for it.

Feature 1

Use 1

Feature 2

Use 2

Feature 3

Use 3

Feature 4

Use 4

[8]

(b) Give three advantages to a teacher of using spreadsheets rather than manually analysing
test results.

[3]

© UCLES 2014 9713/12/M/J/14 [Turn over


14

(c) Describe three features of word processing software that you could use to include the
analysed data in the typed reports.

[3]

(d) Mrs Sharif wants to use a laser printer to print the reports. Give two reasons why she has
chosen a laser printer rather than other types of printer.

[2]

© UCLES 2014 9713/12/M/J/14


15

Scenario 4
Questions 9, 10 and 11

RockICT has a computerised payroll system. Sequential files are used for the master and transaction
files.

Workers are paid on a weekly basis depending on how many hours they work. Batch processing is
used to run the payroll.

Because the system is computerised the payroll office workers are allowed to work from home.

© UCLES 2014 9713/12/M/J/14 [Turn over


16

9 (a) Give three reasons why the company would want their payroll workers to work at home
rather than in the office.

[3]

(b) Describe three reasons why the payroll workers would want to work at home rather than in
the office.

[3]

© UCLES 2014 9713/12/M/J/14


17

10 (a) Describe what is meant by an unordered sequential file.

[1]

(b) Describe what is meant by batch processing,

[3]

© UCLES 2014 9713/12/M/J/14 [Turn over


18

11 Describe six steps in the weekly updating of the payroll master file.

[6]

© UCLES 2014 9713/12/M/J/14


19

BLANK PAGE

© UCLES 2014 9713/12/M/J/14


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/12/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Subsidiary Level and GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED TECHNOLOGY AND


COMMUNICATION TECHNOLOGY
9713/12 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

1 (a)
Number of passengers

A bar code number 

A flight number (consisting of two letters followed by three digits)

Name of destination
[1]

(b)
Number of passengers

A bar code number

A flight number (consisting of two letters followed by three digits) 

Name of destination
[1]

(c)
Number of passengers 

A bar code number

A flight number (consisting of two letters followed by three digits)

Name of destination
[1]

2
Live data is test data that has never been used before

Abnormal data would be 500 passengers on a flight with 300 seats 

Live data is test data for which the results are already known 

Extreme data would be 300 passengers on a flight with 300 seats 

Extreme data is data of the wrong data type for the field concerned

Normal data is data that is within a given range 

Abnormal data is data of the correct type for the field concerned

All data that is not abnormal is extreme

Testing will not indicate where improvements can be made

Modules are never adjusted as a result of testing


[4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

3 (a) Three from:

Using test results to evaluate the solution


Obtaining feedback from the user
(using the results of user feedback/test results) to identify limitations
Using knowledge of the limitations to make improvements
Discussing with managers whether new system has met original objectives [3]

(b) Systems documentation – one mark

Two from:

The results of the systems analysis/dfd diagrams


What is expected of the system/purpose of the system
Overall design decisions such as the choice of hardware and software
Overall design decisions such as file, input and output structures
Test data/test plans so that systems analyst can see the results of these/test results
Systems flowcharts

Program documentation – one mark

Two from:

Description of the software/purpose of the software


Reasons for choosing those pieces of existing software that were used instead of the
programmer having to write code
Input/output data formats
Program flowcharts/algorithm
Program listing – a complete copy of the code used with annotation explaining what each
module of code does
Notes that will help any future programmer to make modifications to the system [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

4 (a) Three from:

Tick boxes which would be suitable for OMR


Strike throughs/lozenges would be suitable for OMR
Multi choice options would be suitable for OMR
Individual character boxes more suitable for OCR [3]

(b) Five from:

Doesn’t matter whether the handwriting is poor with OMR


OMR would need more detailed instructions for the passenger
OMR does not allow extended answers
OMR reading is a more accurate process/fewer mistakes
OCR can be used to read text anywhere/does not rely on reading forms
OMR is a faster method of input
OMR forms are easier to complete than OCR

Must have at least one each from OMR and OCR to gain full marks
One mark is available for a reasoned conclusion [5]

5 (a) Phishing
Two from:
E-mail appear to be from customer's bank
Ask for customer’s details – password, card/account number, other security details
E-mail makes up plausible reason
Can include a link/website address for customer to go to which looks just like the actual
bank’s website but is a fake website

Pharming
Two from:
Installs a piece of malicious software/code on customer’s computer
Fraudster redirects genuine website’s traffic to own website
Customer is now sending personal details to fraudster’s website

Spyware
Two from:
Downloaded/software used to gather user's key presses
Software detects key presses of user logging on to bank site [6]

(b) Three from:

Expense of buying a computer with a broadband internet connection


Unable to make cash deposits or withdraw cash without physically going to the bank
or to an ATM
May not like it that the bank is not providing the ‘personal touch’
May mismanage accounts as it is so easy to transfer money from one account to another [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

(c) Three from:

Save costs as don’t have to rent so many high street premises


Employ fewer staff therefore less paid in staff wages
Save costs of printing/sending statements
Lower running costs, fewer branches so less electricity, heating and lighting
Because of lower costs can offer higher rates of interest for savers and lower rates
of interest for borrowers…
…these rates attract more customers
Less likelihood of the bank being robbed
Less money is spent as there are fewer security staff [3]

6 (a) Anonymised information:


Information about individuals without mentioning the person by name [1]

Aggregated information:
Personal details of individuals are combined to provide information without naming
those individuals [1]

(b) Two from

Can identify the number of customers from a specific area


Can identify the number of customers who have overdrafts
Can identify the number of customers who have deposits greater than a certain sum [2]

(c) Five from:

Information must be kept secure


Must abide by data protection rules
Employees must not share any customer data with anybody outside the organisation
Employees should sign a confidentiality agreement/have a duty of confidence
Employees should have a duty of fidelity
Information about an individual should not be passed from one organisation to
another without permission of the individual [5]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

7 Three from:

Some workers may have to/will have the opportunity to go part time
There will be the opportunity to job share
There will be the opportunity for flexible working hours
There will be the opportunity to work compressed hours
Workers will need to have the ability to move from branch to branch [3]

8 (a) Four matched pairs from:

Conditional formatting
Cells are coloured differently to indicate acceptable progress or otherwise

Graphs/charts
Comparison of student’s chart with target grades/class average/previous scores/gradient
of the graph shows whether there is improvement or not

Calculate average score of student


Comparison of student’s score with average/comparison of student’s score with target
grades

Maximum function
Could see which was highest mark and when

Minimum function
Could see which was lowest mark and when

Sorting/filtering
To produce a rank order of students + reason – for the purpose of grading/setting/to list
best/worst performing students/students achieving a particular mark range/grade so that
these students can be set suitable targets

Goal seek
Could see what test results required to achieve satisfactory average [8]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

(b) Three from:

Results will be calculated more quickly/graphs produced more quickly


Results will be displayed more neatly
Results will be calculated more accurately
Validation can be incorporated
Results can be exported directly into a report/document
Easier to manipulate data
Easier to edit data/errors
Focus on specific areas more easily [3]

(c) Three from:

Import/insert data from spreadsheet


Copy and paste chart from spreadsheet
Link to data/spreadsheet
Mailmerge to insert grades/marks/name of student [3]

(d) Two from:

Inkjet unsuitable for bulk printing


Don’t have to keep changing cartridges like an inkjet
Faster to print multiple copies than inkjet or dot matrix
Dot matrix quality is not good enough [2]

9 (a) Three from:

Don’t have to spend so much on utilities


Increased productivity due to more content workforce/improved motivation
More likely to retain staff so don’t have to spend money on retraining
Lower costs as can rent smaller/fewer offices
Don’t have to pay travelling expenses for conferences
Less need for land for car parking space so some land could be sold off [3]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
GCE AS/A LEVEL – May/June 2014 9713 12

(b) Three from:

Time is not wasted travelling/ more free time because of less travelling
Can spend more time with their family/can arrange their work schedule to suit themselves
Don’t have to live close to the company so can live in area of their choice
Don’t have to spend money on fuel/transport travelling to work
Don’t have the stress of travelling to work in rush hour
If the payroll worker is disabled it’s easier for him/her as he/she doesn’t have to travel [3]

10 (a) With no thought given to the order/data has not been sorted/stored in the order they are
added [1]

(b) Three from:


Data is collected together in a transaction file
In the course of the week
It is processed in one go with the master file
To produce payslips (usually overnight)
Without human intervention [3]

11 Six from:

The transaction file is sorted in the same order as the master file
Sorted on employee number
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out

Then
If transaction relates to calculation of pay:
Computer calculates the pay
Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts this from total pay
Processed record is written to master file
Process is repeated until end of old master file

If transaction relates to deletion, amendment or insertion:


If deletion or amendment old master file record not written to file
If amendment/insertion data in transaction file written to master file
Process is repeated until end of old master file
Remaining records of the transaction file are added to the master file [6]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
*3091675961*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

IB14 06_9713_32/RP
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1 to 4

Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.

PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.

E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.

The airline has a call centre open 24 hours, every day, to deal with customer queries.

PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.

PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.

© UCLES 2014 9713/32/M/J/14


3

1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.

[3]

(b) Describe four steps that a customer would follow when booking flights using PEA’s website.

[4]

(c) Describe what is meant by an electronic ticket.

[1]

© UCLES 2014 9713/32/M/J/14 [Turn over


4

(d) Describe four advantages to a customer of booking an airline ticket online.

[4]

© UCLES 2014 9713/32/M/J/14


5

2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.

[2]

(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.

[6]

(c) The airline call centre uses Computer Telephony Integration (CTI) software.

Describe two features of CTI software that would be useful to the airline.

[2]

© UCLES 2014 9713/32/M/J/14 [Turn over


6

3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.

[6]

(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.

[3]

© UCLES 2014 9713/32/M/J/14


7

4 Explain how Gordon could use a computer model to manage the company finances.

[6]

© UCLES 2014 9713/32/M/J/14 [Turn over


8

Scenario 2
Questions 5 to 7

International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.

Customers can access their accounts either at a branch or by online banking via the bank’s website.

The website can be used by disabled customers with suitably configured computers.

The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.

© UCLES 2014 9713/32/M/J/14


9

5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.

[5]

(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.

[3]

© UCLES 2014 9713/32/M/J/14 [Turn over


10

6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.

[6]

© UCLES 2014 9713/32/M/J/14


11

7 (a) Describe in detail the use of five components of an expert system for financial planning.

[5]

(b) Describe two benefits to the bank of using an expert system.

[2]

(c) Describe two drawbacks to the bank of using an expert system.

[2]

© UCLES 2014 9713/32/M/J/14 [Turn over


12

Scenario 3
Questions 8 to 10

A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.

The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.

The school uses a VPN to enable teachers to access the school network from home.

© UCLES 2014 9713/32/M/J/14


13

8 Describe five ways in which the school’s computers could be used to improve the students’
learning.

[5]

9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.

[6]

© UCLES 2014 9713/32/M/J/14 [Turn over


14

10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.

Device 1

Device 2

Device 3

[6]

(b) Explain what is meant by a VPN.

[3]

© UCLES 2014 9713/32/M/J/14


15

BLANK PAGE

© UCLES 2014 9713/32/M/J/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/32/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/32 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

1 (a) Three descriptions from:

Online check in for flight choice of (available) flight times/destinations


Seating choices/reserve seating for flights
Hotel room reservation for accommodation
Car rental reservation at destination airport travel insurance
Special meal requests on board flight
Special requirements for disabled travellers
Chaperones bookings for children travelling alone
Frequent flyer/loyalty scheme for discounts/facilities [3]

(b) Four from:

Choose home country/select choice of departure airport


Choose destination country/select choice of destination airport
Select flight departure date from dropdown list/ calendar
Select flight departure time from dropdown list/ calendar
Select/choose connection times
Select flight return date from dropdown list
Select flight return time from dropdown list
Select number of travellers
Select type of seat/class of travel
Submit to check availability
Enter details of each traveller
Select payment method and submit payment details
Print/download confirmation details/tickets [4]

(c) One from:

Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]

(d) Four from:

Travel opportunities/availability can be researched at any time and at own pace


Quickly compare prices and facilities of flights
Prices may be cheaper online/online offers available
Bookings can be made at any time
Bookings can be made from anywhere with internet connection
Bookings can be made quicker than via the telephone or personal visit to airline
No chance of double bookings
Immediate confirmation of booking/information about unavailability of flights can be
(re-) printed by customer/airline at any time so ticket cannot be lost [4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

2 (a) Two from:

Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]

(b) Advantages from:

No need to go to travel agents


Assistance always available
Can access assistance from anywhere/use mobile devices

Disadvantages from:

No direct personal contact with airline personnel


Use of untrained/non-expert operators
May not be treated as urgent/centre may screen the call and not answer immediately
Touch tone/menu system may be complicated/difficult to use
Long waits for call to be answered
May be asked the same information several times
Need access to a telephone/mobile or cell phone
People with (hearing) disabilities may find using call centres difficult
(Regional) accents of operators may be difficult to understand

Maximum 4 marks if all advantages or all disadvantages. [6]

(c) Two from:

Can queue calls waiting for attention


Can route calls to next available operative
Displays caller number
Combines voice and data input to the computer system
Supervisor can intervene in call [2]

3 (a) Three descriptions from:

Sensors to detect e.g. movements large/high resolution


monitors...to display video/images of simulations
Joystick/yoke to move items/change direction
Headphones/set to output audio/hear instructions or warnings
Loudspeakers to produce ambient sounds
Microphone/headset microphone to input sound/voice [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

(b) Three descriptions from:


Not real so safer/safety/no danger of being hurt/not so stressed as using a real aircraft
Unusual scenarios can be rehearsed/practised
Can practise/revisit different scenarios/situations/specific aspects of flying aircraft
Can practice take-off/landings at particular airports
Can record/replay actions taken to check progress [3]

4 Descriptions from:

Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]

5 (a) Five from:

Site navigation via menus physically disabled people


Reading text is difficult for visually impaired
Understanding images/plans/layout is difficult for visually impaired
Poor choice of colours/contrasts/too many animations is difficult for visually impaired
Following commentaries/audio instructions/movie or video soundtracks is difficult for hearing
impaired
Understanding instructions is difficult for people with cognitive impairment/learning difficulties
Understanding banking process is difficult for people with cognitive impairment/learning
difficulties
[5]
(b) Software configurations could include e.g.:

Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

6 Explanations from:

Use of customer ID to identify user


Use of PIN known only to customer
Ask for random digits (from PIN)/characters from password
Use of image as “SiteKey” known only to user
Use of card reader using customer bank card to generate unique TAN
Biometrics unique to individual
Security question/answer known only to individual
Use of digital certificate to ensure customer is genuine [6]

7 (a) Five from:

User interface for input of question/query


using multiple choice items
allow entry of customer’s financial details
Explanation system to show how to use the advice system
Knowledge base editor to enter/amend current financial facts e.g. tax rates/allowances
Database of facts/knowledge base to hold/store current financial data e.g. tax rules
Rules base to hold/store financial “rules”
Inference engine to interrogate database and rules [5]

(b) Two from:

Expert systems do not forget details but humans may do so


Copies of expert systems can be made but training humans takes time
Expert system advice is more consistent but human advice may not be the same
Expert systems give better advice than humans because it is based on the knowledge of
many experts
Can be more efficient than humans when dealing with many cases/customers
More consistent with advice/decisions than humans
Documentation is produced automatically
Fraud/errors are reduced [2]

(c) Two from:

Humans can apply judgments/common sense but expert systems cannot


Humans can be creative in unusual situations but expert systems cannot
Humans can learn from experience but expert systems have to be reprogrammed
Experts systems do not recognise when there is no preferred outcome/solution to a financial
problem
Costs of installation/costs of training personnel to use it [2]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

8 Five from e.g.:

Use of presentations/slideshow software to enhance lectures/lessons


Monitor progress with online tests
Use of CAL to allow individual learning
Use of CBT to allow learning at own pace
Use of internet access for research
Use for collaborative learning
Use of computers in formative assessment [5]

9 Six from e.g.:

Use of database software to keep records of work done


Use of spreadsheet software to analyse test marks
Use spreadsheet/database/data manipulation to display progress as graphs or tables
Use word-processing software to write reports on students and letters to parents
Use mail-merge to create batches of reports
Use of email to report progress of individual students
Social networks/SMS/text message to communicate with students/parents about general
student/school progress [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 32

10 (a) Three devices from, max two marks for each:

Network card (NIC):


Has unique MAC address
Connects physical layer with data link layer
Checks address of received packet to see if it should pass it up to host computer
Prepares data packet for sending along media
Hub:
Receives and broadcasts packets to all devices connected to it
Switch:
Receives packets and sends packets only to their specified destination
Router:
Connects networks together/LAN to WAN
Forwards a data packet to its destination on another network
Modem:
Converts analogue signals to/from digital signals for modulation/demodulation onto carrier
waves so that ordinary telephone systems can be used
Bridge:
Connects multiple network segments
Translates packets to/from different network protocols
Repeater:
Reconstitutes and sends packets to next segment of network [6]

Guidance: 1 mark for device


1 mark for description

Description must match device.

(b) Three from:

Virtual Private Network


Uses public communications networks such as internet
To provide remote access to a central company network
Users require authentication to use it
Use of data encryption when transferring data
Use of “tunnels/tunnelling” (over public networks) [3]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
*8732173584*

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 May/June 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

IB14 06_9713_33/FP
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1 to 4

Pan European Airlines (PEA) requires its passengers to book and manage their flight bookings via the
Internet using its online booking system.

PEA has a website offering services to their customers. One of the services is the issuing of electronic
tickets (e-tickets) when passengers book a flight.

E-tickets are produced by the booking system prior to the flights and are used at check-in to issue
boarding passes.

The airline has a call centre open 24 hours, every day, to deal with customer queries.

PEA uses computer systems for training pilots. It has training facilities for its pilots using computer
simulations which require specialised hardware.

PEA uses computer systems for financial purposes. Gordon is the manager of the financial
department and uses computer modelling to manage its finances.

© UCLES 2014 9713/33/M/J/14


3

1 (a) Describe three services other than the issuing of e-tickets that the PEA website could offer
its passengers.

[3]

(b) Describe four steps that a customer would follow when booking flights using PEA’s website.

[4]

(c) Describe what is meant by an electronic ticket.

[1]

© UCLES 2014 9713/33/M/J/14 [Turn over


4

(d) Describe four advantages to a customer of booking an airline ticket online.

[4]

© UCLES 2014 9713/33/M/J/14


5

2 (a) Describe two benefits to the airline of using a call centre to answer passenger enquiries.

[2]

(b) Discuss the advantages and disadvantages to a passenger of using a call centre for
assistance rather than going to a travel agent.

[6]

(c) The airline call centre uses Computer Telephony Integration (CTI) software.

Describe two features of CTI software that would be useful to the airline.

[2]

© UCLES 2014 9713/33/M/J/14 [Turn over


6

3 (a) Describe the use of three specialised items of computer hardware that are required when
using computer simulations to train pilots.

[6]

(b) Describe three advantages to the pilots of using computer simulations rather than real
aircraft to learn to fly.

[3]

© UCLES 2014 9713/33/M/J/14


7

4 Explain how Gordon could use a computer model to manage the company finances.

[6]

© UCLES 2014 9713/33/M/J/14 [Turn over


8

Scenario 2
Questions 5 to 7

International Credit Enterprise is a bank with branches around the country. It holds customers’
personal accounts and their savings accounts.

Customers can access their accounts either at a branch or by online banking via the bank’s website.

The website can be used by disabled customers with suitably configured computers.

The bank also offers financial advice for customers and uses an expert system to help customers with
their financial planning.

© UCLES 2014 9713/33/M/J/14


9

5 (a) Describe five difficulties that disabled people might encounter when trying to use online
banking facilities.

[5]

(b) Describe three software configurations of a personal computer that could be used to assist
disabled people when accessing their bank accounts online.

[3]

© UCLES 2014 9713/33/M/J/14 [Turn over


10

6 Explain how the bank’s computer system would check that the person accessing the account
details has the authority to do so.

[6]

© UCLES 2014 9713/33/M/J/14


11

7 (a) Describe in detail the use of five components of an expert system for financial planning.

[5]

(b) Describe two benefits to the bank of using an expert system.

[2]

(c) Describe two drawbacks to the bank of using an expert system.

[2]

© UCLES 2014 9713/33/M/J/14 [Turn over


12

Scenario 3
Questions 8 to 10

A school has a computer network that can be accessed by students from any computer in the school
and remotely through the school website.

The students use the computers to improve their learning. The teachers use ICT to assist in the
assessment of the students’ work and to keep records of the students’ progress.

The school uses a VPN to enable teachers to access the school network from home.

© UCLES 2014 9713/33/M/J/14


13

8 Describe five ways in which the school’s computers could be used to improve the students’
learning.

[5]

9 Describe how a teacher could use ICT to record the progress of students and report their
progress to parents.

[6]

© UCLES 2014 9713/33/M/J/14 [Turn over


14

10 (a) Describe three network devices which could be used in the school's network. Include details
of how each would handle data packets.

Device 1

Device 2

Device 3

[6]

(b) Explain what is meant by a VPN.

[3]

© UCLES 2014 9713/33/M/J/14


15

BLANK PAGE

© UCLES 2014 9713/33/M/J/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/33/M/J/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
GCE Advanced Level

MARK SCHEME for the May/June 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/33 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2014 series for most IGCSE, GCE
Advanced Level and Advanced Subsidiary Level components and some Ordinary Level components.
Page 2 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

1 (a) Three descriptions from:

Online check in for flight choice of (available) flight times/destinations


Seating choices/reserve seating for flights
Hotel room reservation for accommodation
Car rental reservation at destination airport travel insurance
Special meal requests on board flight
Special requirements for disabled travellers
Chaperones bookings for children travelling alone
Frequent flyer/loyalty scheme for discounts/facilities [3]

(b) Four from:

Choose home country/select choice of departure airport


Choose destination country/select choice of destination airport
Select flight departure date from dropdown list/ calendar
Select flight departure time from dropdown list/ calendar
Select/choose connection times
Select flight return date from dropdown list
Select flight return time from dropdown list
Select number of travellers
Select type of seat/class of travel
Submit to check availability
Enter details of each traveller
Select payment method and submit payment details
Print/download confirmation details/tickets [4]

(c) One from:

Digital ticket sent by email/download exists as digital record (of booking/reservation) in airline
computer system
Contains reservation number and e-ticket number [1]

(d) Four from:

Travel opportunities/availability can be researched at any time and at own pace


Quickly compare prices and facilities of flights
Prices may be cheaper online/online offers available
Bookings can be made at any time
Bookings can be made from anywhere with internet connection
Bookings can be made quicker than via the telephone or personal visit to airline
No chance of double bookings
Immediate confirmation of booking/information about unavailability of flights can be
(re-) printed by customer/airline at any time so ticket cannot be lost [4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

2 (a) Two from:

Fewer (many) premises so reduced costs can provide assistance/availability for longer hours
Can manage staff/resources more efficiently so reduce costs
Reduces vulnerability to single points of failure within communication systems
Reduces costs of forwarding calls to multi-site locations
Reduces costs of line rentals as calls are queued within company system [2]

(b) Advantages from:

No need to go to travel agents


Assistance always available
Can access assistance from anywhere/use mobile devices

Disadvantages from:

No direct personal contact with airline personnel


Use of untrained/non-expert operators
May not be treated as urgent/centre may screen the call and not answer immediately
Touch tone/menu system may be complicated/difficult to use
Long waits for call to be answered
May be asked the same information several times
Need access to a telephone/mobile or cell phone
People with (hearing) disabilities may find using call centres difficult
(Regional) accents of operators may be difficult to understand

Maximum 4 marks if all advantages or all disadvantages. [6]

(c) Two from:

Can queue calls waiting for attention


Can route calls to next available operative
Displays caller number
Combines voice and data input to the computer system
Supervisor can intervene in call [2]

3 (a) Three descriptions from:

Sensors to detect e.g. movements large/high resolution


monitors...to display video/images of simulations
Joystick/yoke to move items/change direction
Headphones/set to output audio/hear instructions or warnings
Loudspeakers to produce ambient sounds
Microphone/headset microphone to input sound/voice [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

(b) Three descriptions from:


Not real so safer/safety/no danger of being hurt/not so stressed as using a real aircraft
Unusual scenarios can be rehearsed/practised
Can practise/revisit different scenarios/situations/specific aspects of flying aircraft
Can practice take-off/landings at particular airports
Can record/replay actions taken to check progress [3]

4 Descriptions from:

Input costs/values....
example: wage/salary/ICT/insurance costs
Calculate the total the company costs
Input price of tickets/projected/ticket sales
Input required/desired profit margins
Use goal seek to determine breakeven/ profit level
Use “what if” scenarios by altering data/values/costs
Run the model to compare it with actual situation [6]

5 (a) Five from:

Site navigation via menus physically disabled people


Reading text is difficult for visually impaired
Understanding images/plans/layout is difficult for visually impaired
Poor choice of colours/contrasts/too many animations is difficult for visually impaired
Following commentaries/audio instructions/movie or video soundtracks is difficult for hearing
impaired
Understanding instructions is difficult for people with cognitive impairment/learning difficulties
Understanding banking process is difficult for people with cognitive impairment/learning
difficulties
[5]
(b) Software configurations could include e.g.:

Sticky keys feature so that e.g. shift key is not needed for upper case
Filter keys to prevent (unintended) multiple key presses
Use of zoom feature/large font size for easier reading
Non-display of images on web site/use of alt text
Use of voice recognition for commands/input of data
Use of text to voice
Eye control software to move cursor [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

6 Explanations from:

Use of customer ID to identify user


Use of PIN known only to customer
Ask for random digits (from PIN)/characters from password
Use of image as “SiteKey” known only to user
Use of card reader using customer bank card to generate unique TAN
Biometrics unique to individual
Security question/answer known only to individual
Use of digital certificate to ensure customer is genuine [6]

7 (a) Five from:

User interface for input of question/query


using multiple choice items
allow entry of customer’s financial details
Explanation system to show how to use the advice system
Knowledge base editor to enter/amend current financial facts e.g. tax rates/allowances
Database of facts/knowledge base to hold/store current financial data e.g. tax rules
Rules base to hold/store financial “rules”
Inference engine to interrogate database and rules [5]

(b) Two from:

Expert systems do not forget details but humans may do so


Copies of expert systems can be made but training humans takes time
Expert system advice is more consistent but human advice may not be the same
Expert systems give better advice than humans because it is based on the knowledge of
many experts
Can be more efficient than humans when dealing with many cases/customers
More consistent with advice/decisions than humans
Documentation is produced automatically
Fraud/errors are reduced [2]

(c) Two from:

Humans can apply judgments/common sense but expert systems cannot


Humans can be creative in unusual situations but expert systems cannot
Humans can learn from experience but expert systems have to be reprogrammed
Experts systems do not recognise when there is no preferred outcome/solution to a financial
problem
Costs of installation/costs of training personnel to use it [2]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

8 Five from e.g.:

Use of presentations/slideshow software to enhance lectures/lessons


Monitor progress with online tests
Use of CAL to allow individual learning
Use of CBT to allow learning at own pace
Use of internet access for research
Use for collaborative learning
Use of computers in formative assessment [5]

9 Six from e.g.:

Use of database software to keep records of work done


Use of spreadsheet software to analyse test marks
Use spreadsheet/database/data manipulation to display progress as graphs or tables
Use word-processing software to write reports on students and letters to parents
Use mail-merge to create batches of reports
Use of email to report progress of individual students
Social networks/SMS/text message to communicate with students/parents about general
student/school progress [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
GCE A LEVEL – May/June 2014 9713 33

10 (a) Three devices from, max two marks for each:

Network card (NIC):


Has unique MAC address
Connects physical layer with data link layer
Checks address of received packet to see if it should pass it up to host computer
Prepares data packet for sending along media
Hub:
Receives and broadcasts packets to all devices connected to it
Switch:
Receives packets and sends packets only to their specified destination
Router:
Connects networks together/LAN to WAN
Forwards a data packet to its destination on another network
Modem:
Converts analogue signals to/from digital signals for modulation/demodulation onto carrier
waves so that ordinary telephone systems can be used
Bridge:
Connects multiple network segments
Translates packets to/from different network protocols
Repeater:
Reconstitutes and sends packets to next segment of network [6]

Guidance: 1 mark for device


1 mark for description

Description must match device.

(b) Three from:

Virtual Private Network


Uses public communications networks such as internet
To provide remote access to a central company network
Users require authentication to use it
Use of data encryption when transferring data
Use of “tunnels/tunnelling” (over public networks) [3]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 8 3 9 4 1 8 8 7 2 6 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NF) 100112
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.

Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.

Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.

IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.

He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.

Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.

The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.

© UCLES 2014 9713/33/O/N/14


3

1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/33/O/N/14 [Turn over


4

2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/33/O/N/14


5

3 Describe three steps that are taken when constructing a computer model of an area being
prospected.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

......................................................................................................................................................[3]

4 Describe the purpose of these network components in the company network.

(a) hub ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) switch ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) wireless access point ................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) firewall .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/33/O/N/14 [Turn over


6

5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.

http ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

FTP ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/33/O/N/14


7

(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/33/O/N/14 [Turn over


8

Scenario 2
Questions 6, 7 and 8

Many people use online booking systems, online auctions and online transaction services.

A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.

It is developing new security software to try to make people more confident about the security of their
personal data when using these services.

© UCLES 2014 9713/33/O/N/14


9

6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) (i) What is meant by ‘computer fraud’?

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe the possible effects on victims of computer fraud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2014 9713/33/O/N/14 [Turn over


10

7 Describe, with examples, what is meant by ‘antisocial use of ICT’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/33/O/N/14


11

8 Describe how timeline software would help the agency when creating its new security software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2014 9713/33/O/N/14 [Turn over


12

Scenario 3
Questions 9, 10 and 11

A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:

• an online focus group


• weblogs
• wikis.

A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.

Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.

© UCLES 2014 9713/33/O/N/14


13

9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.

Problem 1 .........................................................................................................................................

..........................................................................................................................................................

Solution 1 .........................................................................................................................................

..........................................................................................................................................................

Problem 2 .........................................................................................................................................

..........................................................................................................................................................

Solution 2 .........................................................................................................................................

..........................................................................................................................................................

Problem 3 .........................................................................................................................................

..........................................................................................................................................................

Solution 3 .........................................................................................................................................

......................................................................................................................................................[6]

10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/33/O/N/14 [Turn over


14

11 Iqbal will also organise an online focus group to discuss the building of the new road.

(a) Describe how an online focus group could be organised.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/33/O/N/14


15

BLANK PAGE

© UCLES 2014 9713/33/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/33/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/33 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

1 (a) Four from:


Named sensor such as light/infrared
…on satellite/NOAA/NASA/LANDSAT
Data mining from existing research documents
From expert geologists
…collected by appropriate method
…analysed and interpreted/entered into knowledge base [4]

(b) Two from e.g.:


Soil type/type of soil in the location
Chemicals in soil/soil composition
Density of soil
pH of soil
Details/descriptions of any ores found
Geological location of site
Geological makeup/details/landscape of site [2]

2 Eight from:

Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books

Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable

Maximum 6 marks for all advantages or all disadvantages


One mark available for a reasoned conclusion. [8]

3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

4 (a) Receives and/or sends packets


…to all devices connected to it
Broadcasts data packets [2]

(b) Direct flow of data packets to specific/individual devices connected to it


Stores details of mac address of connected device(s) in order to direct packets
…to attempt to avoid congestion on network [2]

(c) Use radio waves


…to connect into existing network [2]

(d) To control data traffic


To analyse traffic/checks (inspects) contents of data packets
To allow or deny access by network traffic
Blocks/allows IP addresses
…compares with block/allow list [2]

5 (a) Two from:


http: Web browser on client/laptop sends http request message
Company server sends http response/completion data to client/laptop
Application layer protocol using IP/TCP to transfer data
Web browser displays data using hypertext/markups in documents

Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]

(b) Four from e.g.:


Encrypt the data before sending
…using keys known only to him/recipient
Use secure/encrypted connection via wireless/Wi-Fi/cable
…use https connection
…use SSL connection
Avoid using public Wi-Fi hotspots
…to try to ensure that signals are not intercepted
Use secure VPN
…to connect over public telecommunications systems [4]

(c) Six from e.g.:


Email for sending messages and attachments
Electronic/video conferencing to discuss/share findings with other geologists
Use instant messaging services to discuss findings with other geologists
VoIP for voice phone calls findings with other geologists/report to offices
VPN for connection into company network
Webmail for email to sending messages and attachments/check messages
FTP for uploading files/downloading documents [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

6 (a) Six from:

Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones

Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access

Maximum 4 marks for all benefits or all drawbacks. [6]

(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]

(ii) Four from, e.g:


Personal identities can be stolen
Money can be taken from bank accounts
Goods can be intercepted
Online tickets can be intercepted [4]

7 Eight from, e.g:


Use of ICT/computer systems
…to cause/inflict harm on others
Deleting/amending/distributing personal data
…gained from company/government databases
Misuse of personal data
…to gain access to services not entitled to
…to distribute SPAM emails
Spreading of viruses
…to cause harm to files/data
Cyberbullying
…with use of social networks/email/text messages [8]

8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

9 Any six points from (max 3 problems and 3 solutions):

Any 3 problems from:


Hackers attempting to access files and copy visitor credit card/personal details
Unauthorised alterations to web site/customer details
Security of data when customer details transferred/stored
Uploading of virus to site
Uploading of spyware
Spammer obtaining email addresses and sending spam
Denial of Service attack

Any 3 appropriate solutions from:


Firewall to control access by computers
Description of appropriate authentication technique
Use of encryption of data when being transferred or stored/use of secure website/https/SSL
Use of digital certification to verify website
Use of up to date anti-virus application
Use of anti-spyware software
Use of spam filtering software
Install a firewall, and configure it to restrict traffic coming into and leaving your computer [6]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

10 Methods from e.g.

Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored

Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters

Website:
Information posted
Online questionnaires collect views

Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings

e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign

Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 33

11 (a) Two from:


Use tele-conferencing to hold discussion
Members can log in at different times to post views/comments [2]

(b) Six from:

Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs

Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 1 8 8 6 6 5 3 4 6 2 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NH) 88703/2
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7

White Nile Foods in Cairo manufactures pre-packed meals.

• The ingredients of the meals are mixed in a large-scale food mixer.


• The mixture is then moved to the production line where individual containers are filled and a lid
and label are placed on each container.
• The containers are then moved to the refrigeration plant for storage prior to transportation.

A systems analyst has been hired to investigate the current system with a view to designing a new
computerised system.

Part of the design of a new system involves specifying the required hardware and software.

At 15 second intervals the current status of the system, including the temperature of the mixture, will be
output to a printer.

If they go ahead with computerising the process, in order to keep the same number of workers
employed, many workers will have to work part-time.

The company would like to use ICT to produce advertising materials to publicise its new range of
products.

© UCLES 2014 9713/11/O/N/14


3

1 Three methods of researching the current system would be the use of questionnaires, interviews
and observations. For each statement below, tick the most appropriate answer.

(a) A drawback of using a questionnaire would be:

Responses can be machine readable

As the questionnaires would be anonymous, system users might exaggerate their responses

Users can take them away and complete them in their own time

It is quicker to collate data


[1]

(b) A drawback of using interviews would be:

System users might not answer honestly and give the answers they think the interviewer wants
to hear
Questions can be tailored to suit the individual

Supplementary questions can be asked

It is possible to make sure that all users’ opinions are collected


[1]

(c) A drawback of using observations would be:

You can see the system first hand

The observer will get a good overall view of the process

System users might behave differently if they know they are being watched

Users do not have to spend time away from work


[1]

© UCLES 2014 9713/11/O/N/14 [Turn over


4

2 Tick four ways in which the inputs, outputs and processing in the existing system would be
established by the systems analyst.

Identify who the manager is

Identify the sources and volume of input data and collection methods

Identify the input documents currently in use

Determine how much each worker is paid

Determine the frequency of the addition and deletion of records

Identify the colours used in the company logo

Identify the manual and computer procedures necessary to achieve the current output

Identify how many workers there are

Identify the manufacturer of the packaging

Determine the location of the food mixer


[4]

© UCLES 2014 9713/11/O/N/14


5

3 (a) Describe what is meant by the following terms when referring to Data Flow Diagrams.

Store .........................................................................................................................................

...................................................................................................................................................

Process box ..............................................................................................................................

...................................................................................................................................................

Data flow arrow .........................................................................................................................

...................................................................................................................................................

Terminator .................................................................................................................................

...............................................................................................................................................[4]

(b) Give three reasons why the systems analyst would use Data Flow Diagrams.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/11/O/N/14 [Turn over


6

4 (a) For each of the following examples describe the type of process control which would be used,
giving a reason why.

Mixing ingredients .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

Production line ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

Refrigeration .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the benefits and drawbacks to the company of using computerised process control.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/11/O/N/14


7

5 The system analyst has recommended the use of a dot matrix printer rather than a laser or inkjet
printer.

Discuss this choice.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/11/O/N/14 [Turn over


8

6 (a) Describe what is meant by working part time.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe two benefits to the workers of working part time.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe two drawbacks to the workers of working part time.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/11/O/N/14


9

7 (a) Describe three advantages to the company of using posters rather than flyers in this scenario.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Give four reasons why the company would advertise using flyers rather than using posters in
this scenario.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/11/O/N/14 [Turn over


10

Scenario 2
Questions 8, 9, 10 and 11

Volcano Ltd is a book publishing company which has several offices throughout Sweden.

In Stockholm the office has a number of departments. The manager of the Humanities department,
Johanna, often works from home. During the winter months she uses a microprocessor controlled
central heating system. The company pay all her expenses for her heating, lighting and equipment
costs.

The offices use video-conferencing for training purposes as required.

The company also sells books using their own online shopping website.

© UCLES 2014 9713/11/O/N/14


11

8 Describe the inputs and outputs of a microprocessor controlled central heating system.

Inputs

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

Outputs

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

9 (a) Apart from distractions at home, give four reasons why the company would want Johanna to
work in the office rather than at home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two possible distractions to Johanna which might interrupt her work at home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/11/O/N/14 [Turn over


12

10 Describe, including the use of essential hardware, how a video-conference for the training would
take place.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2014 9713/11/O/N/14


13

11 (a) A customer has loaded the website of the online shopping system. Describe five steps she
would have to go through in order to select an item before she pays for it.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

5 ................................................................................................................................................

...............................................................................................................................................[5]

(b) Some customers have to use online shopping systems. Give four circumstances where this
is the case.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(c) Describe four reasons why some customers may be unable to use online shopping.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/11/O/N/14 [Turn over


14

Scenario 3
Question 12

China News is a newspaper produced in Beijing. The owners have printing presses in a number of
other Chinese cities.

After journalists type up their stories they submit them to the editor including the photographs they
have used.

After the newspaper layout is completed, satellites are used to send it for printing.

© UCLES 2014 9713/11/O/N/14


15

12 (a) Describe four ICT techniques that the editor would use to produce the newspaper layout after
receiving the journalists’ stories and photographs.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe how satellites are used when faxing a completed page from the main office to the
printing presses in other parts of China.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/11/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/11/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/11 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

1 (a)
Responses can be machine readable

As the questionnaires would be anonymous, system users might exaggerate their



responses

Users can take them away and complete them in their own time

It is quicker to collate data


[1]

(b)
System users might not answer honestly and give the answers they think the

interviewer wants to hear

Questions can be tailored to suit the individual

Supplementary questions can be asked

It is possible to make sure that all users’ opinions are collected


[1]

(c)
You can see the system first hand

The observer will get a good overall view of the process

System users might behave differently if they know they are being watched 

Users do not have to spend time away from work


[1]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

2
Identify who the manager is

Identify the sources and volume of input data and collection methods 

Identify the input documents currently in use 

Determine how much each worker is paid

Determine the frequency of the addition and deletion of records 

Identify the colours used in the company logo

Identify the manual and computer procedures necessary to achieve the current output 

Identify how many workers there are

Identify the manufacturer of the packaging

Determine the location of the food mixer


[4]

3 (a) Store
The actual data output from the system recorded for future use

Process box
Data processes are put in a process box/accept an example

Data flow arrow


Each arrow (is labelled to) shows what data is flowing at that point in the diagram/gives the
direction of data flow

Terminator
When data flows from or to somebody or somewhere outside the system, that somebody or
somewhere is called a terminator [4]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

(b) Three from:

To establish all the relevant features of the existing system


To identify problems with/limitations of the existing system
To help identify the required inputs, outputs, storage and processing requirements of the
system
To determine the quantity and format of the output/type of output devices required
Volume of data being input will be known
To help determine an appropriate method of input/type of input devices
To help him determine the size and speed of the processor required
To determine how much data needs to be stored
To help him know what to recommend in terms of size and number of storage devices
To help identify the user requirements
To help identify suitable hardware and software
To help programmers to develop and improve a new system
Helps show job duplication [3]

4 (a) Mixing ingredients

Batch process control [1]


Raw materials are mixed for a certain length of time/amount of each ingredient could be
controlled by computer/length of time for each stage could be controlled by computer [1]

Production line
Discrete process control [1]
Each container is filled and has a label put on it which is like an on/off or
stop/start process/in between cartons the process pauses/stops [1]

Refrigeration
Continuous process control [1]
Process is virtually unending/low temperature needs to be maintained continuously [1]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

(b) Six from:

Benefits
Quantities of ingredients can be measured more accurately
Time spent on a task can be monitored more accurately
Temperature can be set more accurately
There will be greater productivity
Fewer hours will be worked by each worker so less paid in wages
Whole process can be continuous/no need to stop e.g. at shift changeovers
The product is produced to a more consistent standard

Drawbacks
If incorrect programming whole batch may be lost
Initial costs of computer equipment/technical staff to set it up/initial setup/installation may be
expensive
Cost of retraining workforce will be high
One mark is available for a reasoned conclusion

Must have at least two of each to gain full marks [6]

5 Six from:

Noisy environment so noise of printing is not a factor


Limited data output required so quality is not important
Time interval is such that speed of printing is not an issue
Environment may contain food particles so laser/inkjet may not be robust enough
Running costs of dot matrix printer are lower than laser/inkjet
Ribbon would need to be changed less often than an inkjet cartridge
Paper would not need to be refilled as often as inkjet/laser
Inkjet may produce printouts where the ink will ‘run’ if damp environment
Chemicals from a laser printer could contaminate the food mixture [6]

6 (a) Two from:

Working less than the normal working hours…


…of a full time employee
Working mornings or afternoons only…
…rather than a whole day
Working fewer days…
…rather than the than a full working week [2]

(b) Two from:

More free time/more time to spend with family due to fewer hours worked
Will still be doing work that they have been trained for/are used to…
…if they had to change jobs they might lose their skills/self-confidence
Less stressful as they can miss rush hour traffic [2]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

(c) Two from:

Lower wages due to fewer hours worked


Lower wages as part time workers tend to be on lower rates of pay
Less likely to receive in job training
Difficult to become part of company’s pension scheme/health scheme
May have to work unsociable hours/shifts
May have to find another job to supplement income [2]

7 (a) Three from:

Can be put in strategic locations


Can be aimed at a much wider audience than a local area
Easier to update as you do not have to reprint a lot of copies
Use more professional images
Cannot be so easily destroyed/defaced whereas flyers can be thrown away
Posters are more difficult to ignore/eye catching
Takes a shorter time to put up a poster than to deliver flyers [3]

(b) Four from:

Flyers can be delivered to all households in a locality


Posters/presentations can only be seen in a limited number of places
Can be sure that all of their target audience will see the advertising
Can be printed on own PC and printer/poster more likely to need professional printers
Can cost less to distribute than renting a space
Can be included in newspapers/magazines reducing costs of distribution
Flyers can contain more information than a poster [4]

8 Inputs
Two from

Required room temperature entered by keypad/touch screen/remote control


Current temperature from temperature sensor
Time at which system comes on entered by keypad
Length of time system is to be on/time at which time system switches off entered by keypad

Outputs
Two from

Actuator/signal to heater to switch on/off


Actuator/signal to boiler to switch on/off
Actuator/signal to pump to switch on/off
Temperature on LED/LCD
LED/LCD to show if heater is on or off [4]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

9 (a) Four from:

Easier to keep track of projects/workers/Johanna


Some companies have management systems and cultures that are not (yet) well adapted to
the flexibility of home working
Not all tasks are best performed in a self-managing environment
Workers might work more effectively with a manager directly overseeing them
Would not have to subsidise manager’s home computer/utility costs
Data would be more secure as it would not leave the office
She might not have good enough time management skills to work effectively from home [4]

(b) Two from:

Young children/pets at home demanding attention


Have to take dog for a walk
Family members/neighbours/friends popping round for a chat/visiting
Television may tempt her to watch her favourite programme [2]

10 Five from:

Agree a date and time


Send a reminder shortly before start
Ensure webcam, microphone, speakers are ready
Carry out tests on microphone and speakers/headphones
Large screen/monitor so that trainer can see participants/to output images
Large screen/monitor in offices so that participants can see each other as well as trainer
Speakers so that participants/trainer can hear each other
Microphone – to input voices/so that workers can speak with the trainer
Webcam – to input video/so that images of each examiner can be transmitted/sent
Webcam normally fixed to top of monitor/moved to ensure trainer can be seen
Broadband network connection/router used to transmit voice/pictures between offices
Make sure software is loaded and connection to internet/network connection is working
Participants log on to system/conference/training session [5]

11 (a) Five from:

Browse product/item categories


Find/select product/book/item category
Browse products/books/item
Select product/book/item
Search for product/book title/author/item
Choose format
Choose quantity
Add to/place selected products in shopping basket
Enter/log on using username and password [5]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 11

(b) Four from:

If you work certain hours and cannot get to book shop in normal opening hours
Where it’s difficult to leave the house due to young family
People with disabilities making it difficult to walk
When you live in remote areas/live long way from shops
The shop you want to use only has an online presence
The book/product is not available in the local shop
May not have any type of transport to get to the shop [4]

(c) Four from:

May not have a computer with a reliable internet connection


May not have a reliable electricity supply
May not have the computer skills necessary
Some people may not have a credit/debit card
Some people with sight disabilities may not be able to see details on the screen
Some people with poor motor skills/hand disabilities might not be able to control the mouse
[4]

12 (a) Four from

Format the reporter’s story


Template of the newspaper is created
Typesetting/kerning to adjust spacing between characters
Fonts and font size chosen
Leading/space between lines is chosen
Margin sizes are chosen
Crop the images to remove unwanted material
Resize the image to fill the layout
Choose the orientation [4]

(b) Three from:

Encoded/digital signals are used to send the pages up to a satellite


Satellite receives the data signals
Satellite directs the signals towards the destination fax machine/signal is transmitted to the
printing plant
Signal is received by the antenna/receiver [3]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 2 7 7 6 4 9 8 0 0 8 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NF) 99988
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4, 5, 6 and 7

White Nile Foods in Cairo manufactures pre-packed meals.

• The ingredients of the meals are mixed in a large-scale food mixer.


• The mixture is then moved to the production line where individual containers are filled and a lid
and label are placed on each container.
• The containers are then moved to the refrigeration plant for storage prior to transportation.

A systems analyst has been hired to investigate the current system with a view to designing a new
computerised system.

Part of the design of a new system involves specifying the required hardware and software.

At 15 second intervals the current status of the system, including the temperature of the mixture, will be
output to a printer.

If they go ahead with computerising the process, in order to keep the same number of workers
employed, many workers will have to work part-time.

The company would like to use ICT to produce advertising materials to publicise its new range of
products.

© UCLES 2014 9713/12/O/N/14


3

1 Three methods of researching the current system would be the use of questionnaires, interviews
and observations. For each statement below, tick the most appropriate answer.

(a) A drawback of using a questionnaire would be:

Responses can be machine readable

As the questionnaires would be anonymous, system users might exaggerate their responses

Users can take them away and complete them in their own time

It is quicker to collate data


[1]

(b) A drawback of using interviews would be:

System users might not answer honestly and give the answers they think the interviewer wants
to hear
Questions can be tailored to suit the individual

Supplementary questions can be asked

It is possible to make sure that all users’ opinions are collected


[1]

(c) A drawback of using observations would be:

You can see the system first hand

The observer will get a good overall view of the process

System users might behave differently if they know they are being watched

Users do not have to spend time away from work


[1]

© UCLES 2014 9713/12/O/N/14 [Turn over


4

2 Tick four ways in which the inputs, outputs and processing in the existing system would be
established by the systems analyst.

Identify who the manager is

Identify the sources and volume of input data and collection methods

Identify the input documents currently in use

Determine how much each worker is paid

Determine the frequency of the addition and deletion of records

Identify the colours used in the company logo

Identify the manual and computer procedures necessary to achieve the current output

Identify how many workers there are

Identify the manufacturer of the packaging

Determine the location of the food mixer


[4]

© UCLES 2014 9713/12/O/N/14


5

3 (a) Describe what is meant by the following terms when referring to Data Flow Diagrams.

Store .........................................................................................................................................

...................................................................................................................................................

Process box ..............................................................................................................................

...................................................................................................................................................

Data flow arrow .........................................................................................................................

...................................................................................................................................................

Terminator .................................................................................................................................

...............................................................................................................................................[4]

(b) Give three reasons why the systems analyst would use Data Flow Diagrams.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/12/O/N/14 [Turn over


6

4 (a) For each of the following examples describe the type of process control which would be used,
giving a reason why.

Mixing ingredients .....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

Production line ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

Refrigeration .............................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the benefits and drawbacks to the company of using computerised process control.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/12/O/N/14


7

5 The system analyst has recommended the use of a dot matrix printer rather than a laser or inkjet
printer.

Discuss this choice.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/12/O/N/14 [Turn over


8

6 (a) Describe what is meant by working part time.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe two benefits to the workers of working part time.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe two drawbacks to the workers of working part time.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/12/O/N/14


9

7 (a) Describe three advantages to the company of using posters rather than flyers in this scenario.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Give four reasons why the company would advertise using flyers rather than using posters in
this scenario.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/12/O/N/14 [Turn over


10

Scenario 2
Questions 8, 9, 10 and 11

Volcano Ltd is a book publishing company which has several offices throughout Sweden.

In Stockholm the office has a number of departments. The manager of the Humanities department,
Johanna, often works from home. During the winter months she uses a microprocessor controlled
central heating system. The company pay all her expenses for her heating, lighting and equipment
costs.

The offices use video-conferencing for training purposes as required.

The company also sells books using their own online shopping website.

© UCLES 2014 9713/12/O/N/14


11

8 Describe the inputs and outputs of a microprocessor controlled central heating system.

Inputs

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

Outputs

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

9 (a) Apart from distractions at home, give four reasons why the company would want Johanna to
work in the office rather than at home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two possible distractions to Johanna which might interrupt her work at home.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/12/O/N/14 [Turn over


12

10 Describe, including the use of essential hardware, how a video-conference for the training would
take place.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2014 9713/12/O/N/14


13

11 (a) A customer has loaded the website of the online shopping system. Describe five steps she
would have to go through in order to select an item before she pays for it.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

5 ................................................................................................................................................

...............................................................................................................................................[5]

(b) Some customers have to use online shopping systems. Give four circumstances where this
is the case.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(c) Describe four reasons why some customers may be unable to use online shopping.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/12/O/N/14 [Turn over


14

Scenario 3
Question 12

China News is a newspaper produced in Beijing. The owners have printing presses in a number of
other Chinese cities.

After journalists type up their stories they submit them to the editor including the photographs they
have used.

After the newspaper layout is completed, satellites are used to send it for printing.

© UCLES 2014 9713/12/O/N/14


15

12 (a) Describe four ICT techniques that the editor would use to produce the newspaper layout after
receiving the journalists’ stories and photographs.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe how satellites are used when faxing a completed page from the main office to the
printing presses in other parts of China.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/12/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/12/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/12 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

1 (a)
Responses can be machine readable

As the questionnaires would be anonymous, system users might exaggerate their



responses

Users can take them away and complete them in their own time

It is quicker to collate data


[1]

(b)
System users might not answer honestly and give the answers they think the

interviewer wants to hear

Questions can be tailored to suit the individual

Supplementary questions can be asked

It is possible to make sure that all users’ opinions are collected


[1]

(c)
You can see the system first hand

The observer will get a good overall view of the process

System users might behave differently if they know they are being watched 

Users do not have to spend time away from work


[1]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

2
Identify who the manager is

Identify the sources and volume of input data and collection methods 

Identify the input documents currently in use 

Determine how much each worker is paid

Determine the frequency of the addition and deletion of records 

Identify the colours used in the company logo

Identify the manual and computer procedures necessary to achieve the current output 

Identify how many workers there are

Identify the manufacturer of the packaging

Determine the location of the food mixer


[4]

3 (a) Store
The actual data output from the system recorded for future use

Process box
Data processes are put in a process box/accept an example

Data flow arrow


Each arrow (is labelled to) shows what data is flowing at that point in the diagram/gives the
direction of data flow

Terminator
When data flows from or to somebody or somewhere outside the system, that somebody or
somewhere is called a terminator [4]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

(b) Three from:

To establish all the relevant features of the existing system


To identify problems with/limitations of the existing system
To help identify the required inputs, outputs, storage and processing requirements of the
system
To determine the quantity and format of the output/type of output devices required
Volume of data being input will be known
To help determine an appropriate method of input/type of input devices
To help him determine the size and speed of the processor required
To determine how much data needs to be stored
To help him know what to recommend in terms of size and number of storage devices
To help identify the user requirements
To help identify suitable hardware and software
To help programmers to develop and improve a new system
Helps show job duplication [3]

4 (a) Mixing ingredients

Batch process control [1]


Raw materials are mixed for a certain length of time/amount of each ingredient could be
controlled by computer/length of time for each stage could be controlled by computer [1]

Production line
Discrete process control [1]
Each container is filled and has a label put on it which is like an on/off or
stop/start process/in between cartons the process pauses/stops [1]

Refrigeration
Continuous process control [1]
Process is virtually unending/low temperature needs to be maintained continuously [1]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

(b) Six from:

Benefits
Quantities of ingredients can be measured more accurately
Time spent on a task can be monitored more accurately
Temperature can be set more accurately
There will be greater productivity
Fewer hours will be worked by each worker so less paid in wages
Whole process can be continuous/no need to stop e.g. at shift changeovers
The product is produced to a more consistent standard

Drawbacks
If incorrect programming whole batch may be lost
Initial costs of computer equipment/technical staff to set it up/initial setup/installation may be
expensive
Cost of retraining workforce will be high
One mark is available for a reasoned conclusion

Must have at least two of each to gain full marks [6]

5 Six from:

Noisy environment so noise of printing is not a factor


Limited data output required so quality is not important
Time interval is such that speed of printing is not an issue
Environment may contain food particles so laser/inkjet may not be robust enough
Running costs of dot matrix printer are lower than laser/inkjet
Ribbon would need to be changed less often than an inkjet cartridge
Paper would not need to be refilled as often as inkjet/laser
Inkjet may produce printouts where the ink will ‘run’ if damp environment
Chemicals from a laser printer could contaminate the food mixture [6]

6 (a) Two from:

Working less than the normal working hours…


…of a full time employee
Working mornings or afternoons only…
…rather than a whole day
Working fewer days…
…rather than the than a full working week [2]

(b) Two from:

More free time/more time to spend with family due to fewer hours worked
Will still be doing work that they have been trained for/are used to…
…if they had to change jobs they might lose their skills/self-confidence
Less stressful as they can miss rush hour traffic [2]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

(c) Two from:

Lower wages due to fewer hours worked


Lower wages as part time workers tend to be on lower rates of pay
Less likely to receive in job training
Difficult to become part of company’s pension scheme/health scheme
May have to work unsociable hours/shifts
May have to find another job to supplement income [2]

7 (a) Three from:

Can be put in strategic locations


Can be aimed at a much wider audience than a local area
Easier to update as you do not have to reprint a lot of copies
Use more professional images
Cannot be so easily destroyed/defaced whereas flyers can be thrown away
Posters are more difficult to ignore/eye catching
Takes a shorter time to put up a poster than to deliver flyers [3]

(b) Four from:

Flyers can be delivered to all households in a locality


Posters/presentations can only be seen in a limited number of places
Can be sure that all of their target audience will see the advertising
Can be printed on own PC and printer/poster more likely to need professional printers
Can cost less to distribute than renting a space
Can be included in newspapers/magazines reducing costs of distribution
Flyers can contain more information than a poster [4]

8 Inputs
Two from

Required room temperature entered by keypad/touch screen/remote control


Current temperature from temperature sensor
Time at which system comes on entered by keypad
Length of time system is to be on/time at which time system switches off entered by keypad

Outputs
Two from

Actuator/signal to heater to switch on/off


Actuator/signal to boiler to switch on/off
Actuator/signal to pump to switch on/off
Temperature on LED/LCD
LED/LCD to show if heater is on or off [4]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

9 (a) Four from:

Easier to keep track of projects/workers/Johanna


Some companies have management systems and cultures that are not (yet) well adapted to
the flexibility of home working
Not all tasks are best performed in a self-managing environment
Workers might work more effectively with a manager directly overseeing them
Would not have to subsidise manager’s home computer/utility costs
Data would be more secure as it would not leave the office
She might not have good enough time management skills to work effectively from home [4]

(b) Two from:

Young children/pets at home demanding attention


Have to take dog for a walk
Family members/neighbours/friends popping round for a chat/visiting
Television may tempt her to watch her favourite programme [2]

10 Five from:

Agree a date and time


Send a reminder shortly before start
Ensure webcam, microphone, speakers are ready
Carry out tests on microphone and speakers/headphones
Large screen/monitor so that trainer can see participants/to output images
Large screen/monitor in offices so that participants can see each other as well as trainer
Speakers so that participants/trainer can hear each other
Microphone – to input voices/so that workers can speak with the trainer
Webcam – to input video/so that images of each examiner can be transmitted/sent
Webcam normally fixed to top of monitor/moved to ensure trainer can be seen
Broadband network connection/router used to transmit voice/pictures between offices
Make sure software is loaded and connection to internet/network connection is working
Participants log on to system/conference/training session [5]

11 (a) Five from:

Browse product/item categories


Find/select product/book/item category
Browse products/books/item
Select product/book/item
Search for product/book title/author/item
Choose format
Choose quantity
Add to/place selected products in shopping basket
Enter/log on using username and password [5]

© Cambridge International Examinations 2014


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 12

(b) Four from:

If you work certain hours and cannot get to book shop in normal opening hours
Where it’s difficult to leave the house due to young family
People with disabilities making it difficult to walk
When you live in remote areas/live long way from shops
The shop you want to use only has an online presence
The book/product is not available in the local shop
May not have any type of transport to get to the shop [4]

(c) Four from:

May not have a computer with a reliable internet connection


May not have a reliable electricity supply
May not have the computer skills necessary
Some people may not have a credit/debit card
Some people with sight disabilities may not be able to see details on the screen
Some people with poor motor skills/hand disabilities might not be able to control the mouse
[4]

12 (a) Four from

Format the reporter’s story


Template of the newspaper is created
Typesetting/kerning to adjust spacing between characters
Fonts and font size chosen
Leading/space between lines is chosen
Margin sizes are chosen
Crop the images to remove unwanted material
Resize the image to fill the layout
Choose the orientation [4]

(b) Three from:

Encoded/digital signals are used to send the pages up to a satellite


Satellite receives the data signals
Satellite directs the signals towards the destination fax machine/signal is transmitted to the
printing plant
Signal is received by the antenna/receiver [3]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 6 6 7 6 4 6 8 9 1 9 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NH) 88704/2
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4, 5 and 6

Ali Fashions Ltd has a number of stores in Cairo. It is converting its existing computer system to make
it more efficient.

A systems analyst is being employed to analyse the existing system and then design the new system.

Ali Fashions Ltd currently has two separate files, one for storing customer records and another for
storing records of sales.

The customer records are processed as a single master file at the end of the day using a transaction
file which is created in the course of the day. There are three types of transaction. Examples are:

• A customer cancels their account


• A new customer account is created
• A sale or payment is made.

When customers buy goods the cost of the goods is added to their account. For example, a customer
buying a shirt costing $20 would need to have that sale recorded on their account. If they already owed
$40, $20 would need to be added to their account to give a balance of $60.

They pay what they owe at the end of each month.

The systems analyst has decided that the sales records and the customer records should be combined
into a relational database system.

© UCLES 2014 9713/13/O/N/14


3

1 Three methods of implementing the new system would be the use of parallel running, direct
changeover and pilot running. For each statement below, tick the most appropriate answer.

(a) An advantage of using parallel running would be:

It is the cheapest method of implementation

If there is a fault with the new system the old system can still be used

It is the fastest method of implementation

You need two sets of workers


[1]

(b) An advantage of using direct changeover would be:

If there is a fault with the new system the old system can still be used

There is no need to train the workers

The benefits of the new system are available immediately

The new system does not require any documentation


[1]

(c) An advantage of using pilot running would be:

If there is a fault with the new system not all stores in the organisation would be affected

If there is a fault with the new system none of the stores in the organisation would be affected

It is a quicker method of implementation than direct changeover

It is a cheaper method than direct changeover


[1]

© UCLES 2014 9713/13/O/N/14 [Turn over


4

2 Tick four reasons why technical documentation is produced.

To provide the systems analyst with a detailed overview of the whole system

So that user documentation does not have to be produced

So that cashiers can troubleshoot simple problems

To make sure the developed system matches the design

So that the system can be evaluated

To help when the system needs amending to eliminate errors

So that programmers can fully understand the program code that has been used

So that users can fully understand the system

To help cashiers operate the POS terminals

To refer to when the system needs further development or upgrading


[4]

© UCLES 2014 9713/13/O/N/14


5

3 The calculations involved in updating a customer record file following a purchase will need to be
tested. A test plan consisting of a table containing columns would be created.

Name three of the column headings. For each one give an example or description of the possible
contents of the column making reference to the data given in the scenario.

Heading 1 .........................................................................................................................................

..........................................................................................................................................................

Contents ...........................................................................................................................................

..........................................................................................................................................................

Heading 2 .........................................................................................................................................

..........................................................................................................................................................

Contents ...........................................................................................................................................

..........................................................................................................................................................

Heading 3 .........................................................................................................................................

..........................................................................................................................................................

Contents ...........................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/13/O/N/14 [Turn over


6

4 (a) Name three types of transaction involved in the updating of the master file at the end of the
day. Using the scenario, give one example of each type of transaction.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Fixed magnetic hard disks are used to store the transaction and master data files. Discuss
the advantages and disadvantages of using disks compared with using magnetic tape for this
storage.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/13/O/N/14


7

5 (a) Describe the relational database that would need to be created to store the sales records and
the customer records.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Give three reasons why the systems analyst would recommend a relational database.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/13/O/N/14 [Turn over


8

6 (a) When data is entered into the new database it will need to be verified. Describe two ways in
which this can be done.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe the differences between validation and verification.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2014 9713/13/O/N/14


9

Scenario 2
Questions 7, 8, 9 and 10

The WIMBA car company has automated production lines. Computer controlled robot arms are used to
produce its new model.

The company wishes to advertise all aspects of its business, including car insurance, as well as this
new model. It is planning to advertise using multimedia presentations in shopping malls.

Maria is the manager of the advertising department. She uses time management software in her job.
Many workers in her department work compressed hours.

© UCLES 2014 9713/13/O/N/14 [Turn over


10

7 (a) For each of the following four end effectors, describe the task each would perform in car
production.

Camera .....................................................................................................................................

...................................................................................................................................................

Welding gun ..............................................................................................................................

...................................................................................................................................................

Vacuum cup ..............................................................................................................................

...................................................................................................................................................

Spray gun .................................................................................................................................

...............................................................................................................................................[4]

(b) Give four reasons why companies use robots when assembling car bodies.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/13/O/N/14


11

8 (a) Describe the three types of advertising shown below. Give an example of each type, referring
only to aspects of the car company used in this scenario.

Business ...................................................................................................................................

...................................................................................................................................................

Example ....................................................................................................................................

...................................................................................................................................................

Product .....................................................................................................................................

...................................................................................................................................................

Example ....................................................................................................................................

...................................................................................................................................................

Service ......................................................................................................................................

...................................................................................................................................................

Example ....................................................................................................................................

...............................................................................................................................................[6]

(b) Describe, with reference to the scenario, four features which are found in a multimedia
presentation which would not be found in a flyer.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/13/O/N/14 [Turn over


12

9 Maria uses software to help her carry out a number of time management tasks.

Describe three of these tasks that she might wish to carry out.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

......................................................................................................................................................[3]

10 (a) Describe what is meant by working compressed hours.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe two drawbacks to the worker of working compressed hours.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe two drawbacks to the company of workers working compressed hours.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/13/O/N/14


13

Scenario 3
Question 11

ICE refrigerators Ltd is an English company which manufactures refrigerators. It provides a help line
service to its customers.

When customers phone the help line they are put through to a call centre. The call centre has a system
which automatically processes the phone call before the operator speaks to the customer.

Health and Safety issues often arise through the use of computer equipment at the call centre.

© UCLES 2014 9713/13/O/N/14 [Turn over


14

11 (a) Describe four measures which could be taken to minimise safety risks.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe four different measures which operators could take to minimise health problems.
Include in your description the health problem each measure would help to minimise.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/13/O/N/14


15

(c) Describe five steps involved in the processing of a customer call by the call centre’s automated
system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

5 ................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2014 9713/13/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/13/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/13 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

1 (a)
It is the cheapest method of implementation
If there is a fault with the new system the old system can still be used 

It is the fastest method of implementation


You need two sets of workers
[1]

(b)
If there is a fault with the new system the old system can still be used
There is no need to train the workers
The benefits of the new system are available immediately 

The new system does not require any documentation


[1]

(c)
If there is a fault with the new system not all stores in the organisation would be

affected
If there is a fault with the new system none of the stores in the organisation would be
affected
It is a quicker method of implementation than direct changeover
It is a cheaper method than direct changeover
[1]

2
To provide the systems analyst with a detailed overview of the whole system 

So that user documentation does not have to be produced


So that cashiers can troubleshoot simple problems
To make sure the developed system matches the design
So that the system can be evaluated
To help when the system needs amending to eliminate errors 

So that programmers can fully understand the program code that has been used 

So that users can fully understand the system


To help cashiers operate the POS terminals
To refer to when the system needs further development or upgrading 
[4]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

3 Three matched pairs from:

Test data
This column would contain test data values such as 40 and 20/description of test data

Expected results
This column would contain the calculation 20 + 40 = 60/description of expected results

Actual results
This column would contain the actual results of the test, in this case 60/description of actual
results

Comment
This column would contain whether the test worked, in this case whether 60 was produced or
not/description of a comment

Accept other column headings if feasible [6]

4 (a) Matched pairs

Amendment [1]
A customer’s address/name is changed/customer buys something +[1]

Deletion [1]
A customer closes their account/dies +[1]

Insertion [1]
A new customer opens an account +[1]

(b) Six from:

Magnetic disc has faster access than magnetic tape to data for reading from a file
Magnetic disc has faster access than magnetic tape to data for writing to a file
Fixed magnetic disc is not as portable as a magnetic tape, so not as effective for transaction
file…
…if this is to be prepared off line
Data on a magnetic disc has direct access…
…so useful if data from master file is required quickly
Data on a magnetic tape requires serial access…
…but as all the data on the transaction file will be used this is not an issue

One mark is available for a reasoned conclusion [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

5 (a) Five from:

The relational database consists of two tables


A customer records table and a sales records table
The tables are linked to each other…
…using a key field
…for example the customer ID
This field is part of other table(s)
Data from one table combined with data from other table(s) when producing reports
Can select different fields from each table for output
SQL is used for queries and producing reports [5]

(b) Three from:

Data is not repeated


Less storage capacity needed
Easier to expand the database
Data only needs to be amended once
Easier to produce reports with cross-tabular data
Data integrity is maintained
Hackers would find it more difficult to access data than if they were separate flat files [3]

6 (a) Two matched points from:

Visual verification
Visually compare data on screen/printout with original/source document
Decide which version is correct if differences are spotted

Double data entry


Two people type in data/one person types in data twice
Computer compares two versions
Keyboard freezes/sound made/data flagged if differences occur
Decide which version is correct if differences are spotted [4]

(b) Three from:

Verification checks that data is copied correctly from one medium to another
Verification checks that versions of data have been entered correctly
Verification does not check if data is correct or reasonable
Validation is used to check entered data is reasonable/acceptable [3]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

7 (a) Four from:

Camera – to inspect work

Welding gun – to weld parts of the car body together

Vacuum cup – to pick up parts of the body

Spray gun- to paint the car body [4]

(b) Four from:

A robot arm has greater accuracy/fewer errors than a human


There are lower running costs/no need to pay robots wages/lower utility costs
Work/work rate is of a consistent standard
The whole process can be continuous/24 hours a day 7 days a week…
…without having to stop at shift changeovers
It is a safer/less dangerous environment for humans/robots can work in harsh/hazardous
conditions
Greater productivity [4]

8 (a) Three descriptions and three examples from:

Business – Advertises the whole company to make the company name familiar not just a
single product or service

Example – advertising the WIMBA car company as a whole

Product – Advertising a specific/single product

Example – The new model of car

Service – Advertising of a service such as banking, insurance, education/a service the


company provides (for its customers)

Example – car insurance [6]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

(b) Four descriptions from:

Sound could be used in voiceovers/welcome from managing director


Soothing background music to create a comfortable feel for customers
Video of the car being manufactured/recordings of satisfied customers
Animation to demonstrate insurance services/animated 3D logo of the company
Hyperlinks to navigate between slides of different aspects of the company or cars/link to
company’s website
Navigation button to navigate between slides of different cars/different aspects of the
company [4]

9 Three from:

Descriptions of:
Organising meeting times
Arranging workloads
Organising research and development projects
Project management [3]

10 (a) Two from:

Involves working the same number of hours as normal


Over a shorter number of days
Usually involves working 4½ days in a week/9 days out of 10 in a period of two weeks [2]

(b) Two from:

Can be very tired after working long hours


Have to get up earlier/work later most days
Spend less time with family on working days
Less leisure time on working days [2]

(c) Two from:

Difficult to arrange training/meeting times/working hours to suit all workers


Utilities may be more expensive as advertising department is working longer hours
Work needs to be carried out over the whole week but the employee is not always there [2]

11 (a) Four from:

Do not overload sockets


Only allow qualified electricians to install electrical equipment
Equipment should be checked regularly
Cabling should be tied up/trunked
Electrical equipment must be located away from water supplies
Do not take drinks near electrical equipment
Have several carbon dioxide fire extinguishers
Benching/work desks should be sturdy enough to take the weight of heavy equipment/do not
allow heavy equipment to overhang [4]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 13

(b) Four matched pairs from:

Measure
Get up and walk around every so often
Good quality seating that supports the back/sitting in an appropriate position
Height-adjustable seating
Focus on a distant object from time to time/improve the lighting in the room/have anti-glare
screens
Use ergonometric/ergonomic keyboards
Height, position and distance from worker of screens/keyboards should be optimised

Health problem
Lower back pain
Problems with one’s sight
RSI in the fingers
RSI in the wrists/carpal tunnel syndrome
Eye strain/headaches
Upper back/neck/shoulder pain/eyestrain/headaches [4]

(c) Five from:

Interactive voice response (IVR) software deals with initial request


IVR provides options to customer
IVR provides automated services
If necessary phone call is directed to (appropriate operator)
Call can be queued
Caller’s number is displayed to operator
Customer records, if available, displayed to operator [5]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 3 5 0 9 2 9 7 9 5 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NH) 88702/2
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.

Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.

Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.

IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.

He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.

Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.

The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.

© UCLES 2014 9713/31/O/N/14


3

1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/31/O/N/14 [Turn over


4

2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/31/O/N/14


5

3 Describe three steps that are taken when constructing a computer model of an area being
prospected.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

......................................................................................................................................................[3]

4 Describe the purpose of these network components in the company network.

(a) hub ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) switch ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) wireless access point ................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) firewall .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/31/O/N/14 [Turn over


6

5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.

http ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

FTP ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/31/O/N/14


7

(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/31/O/N/14 [Turn over


8

Scenario 2
Questions 6, 7 and 8

Many people use online booking systems, online auctions and online transaction services.

A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.

It is developing new security software to try to make people more confident about the security of their
personal data when using these services.

© UCLES 2014 9713/31/O/N/14


9

6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) (i) What is meant by ‘computer fraud’?

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe the possible effects on victims of computer fraud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2014 9713/31/O/N/14 [Turn over


10

7 Describe, with examples, what is meant by ‘antisocial use of ICT’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/31/O/N/14


11

8 Describe how timeline software would help the agency when creating its new security software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2014 9713/31/O/N/14 [Turn over


12

Scenario 3
Questions 9, 10 and 11

A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:

• an online focus group


• weblogs
• wikis.

A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.

Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.

© UCLES 2014 9713/31/O/N/14


13

9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.

Problem 1 .........................................................................................................................................

..........................................................................................................................................................

Solution 1 .........................................................................................................................................

..........................................................................................................................................................

Problem 2 .........................................................................................................................................

..........................................................................................................................................................

Solution 2 .........................................................................................................................................

..........................................................................................................................................................

Problem 3 .........................................................................................................................................

..........................................................................................................................................................

Solution 3 .........................................................................................................................................

......................................................................................................................................................[6]

10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/31/O/N/14 [Turn over


14

11 Iqbal will also organise an online focus group to discuss the building of the new road.

(a) Describe how an online focus group could be organised.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/31/O/N/14


15

BLANK PAGE

© UCLES 2014 9713/31/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/31/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/31 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

1 (a) Four from:


Named sensor such as light/infrared
…on satellite/NOAA/NASA/LANDSAT
Data mining from existing research documents
From expert geologists
…collected by appropriate method
…analysed and interpreted/entered into knowledge base [4]

(b) Two from e.g.:


Soil type/type of soil in the location
Chemicals in soil/soil composition
Density of soil
pH of soil
Details/descriptions of any ores found
Geological location of site
Geological makeup/details/landscape of site [2]

2 Eight from:

Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books

Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable

Maximum 6 marks for all advantages or all disadvantages


One mark available for a reasoned conclusion. [8]

3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

4 (a) Receives and/or sends packets


…to all devices connected to it
Broadcasts data packets [2]

(b) Direct flow of data packets to specific/individual devices connected to it


Stores details of mac address of connected device(s) in order to direct packets
…to attempt to avoid congestion on network [2]

(c) Use radio waves


…to connect into existing network [2]

(d) To control data traffic


To analyse traffic/checks (inspects) contents of data packets
To allow or deny access by network traffic
Blocks/allows IP addresses
…compares with block/allow list [2]

5 (a) Two from:


http: Web browser on client/laptop sends http request message
Company server sends http response/completion data to client/laptop
Application layer protocol using IP/TCP to transfer data
Web browser displays data using hypertext/markups in documents

Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]

(b) Four from e.g.:


Encrypt the data before sending
…using keys known only to him/recipient
Use secure/encrypted connection via wireless/Wi-Fi/cable
…use https connection
…use SSL connection
Avoid using public Wi-Fi hotspots
…to try to ensure that signals are not intercepted
Use secure VPN
…to connect over public telecommunications systems [4]

(c) Six from e.g.:


Email for sending messages and attachments
Electronic/video conferencing to discuss/share findings with other geologists
Use instant messaging services to discuss findings with other geologists
VoIP for voice phone calls findings with other geologists/report to offices
VPN for connection into company network
Webmail for email to sending messages and attachments/check messages
FTP for uploading files/downloading documents [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

6 (a) Six from:

Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones

Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access

Maximum 4 marks for all benefits or all drawbacks. [6]

(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]

(ii) Four from, e.g:


Personal identities can be stolen
Money can be taken from bank accounts
Goods can be intercepted
Online tickets can be intercepted [4]

7 Eight from, e.g:


Use of ICT/computer systems
…to cause/inflict harm on others
Deleting/amending/distributing personal data
…gained from company/government databases
Misuse of personal data
…to gain access to services not entitled to
…to distribute SPAM emails
Spreading of viruses
…to cause harm to files/data
Cyberbullying
…with use of social networks/email/text messages [8]

8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

9 Any six points from (max 3 problems and 3 solutions):

Any 3 problems from:


Hackers attempting to access files and copy visitor credit card/personal details
Unauthorised alterations to web site/customer details
Security of data when customer details transferred/stored
Uploading of virus to site
Uploading of spyware
Spammer obtaining email addresses and sending spam
Denial of Service attack

Any 3 appropriate solutions from:


Firewall to control access by computers
Description of appropriate authentication technique
Use of encryption of data when being transferred or stored/use of secure website/https/SSL
Use of digital certification to verify website
Use of up to date anti-virus application
Use of anti-spyware software
Use of spam filtering software
Install a firewall, and configure it to restrict traffic coming into and leaving your computer [6]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

10 Methods from e.g.

Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored

Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters

Website:
Information posted
Online questionnaires collect views

Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings

e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign

Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 31

11 (a) Two from:


Use tele-conferencing to hold discussion
Members can log in at different times to post views/comments [2]

(b) Six from:

Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs

Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Level
* 7 4 5 6 6 5 1 1 4 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 October/November 2014
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NF) 100063
© UCLES 2014 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

International Exploration & Mining (IEM) is a multi-national company specialising in mineral prospecting.

Fergal is employed by the company as an inspector to visit and inspect geological sites in search of
deposits of mineral ores.

Fergal takes a laptop computer when visiting a potential site and uses it to record his findings.

IEM has created an expert system for use by their inspectors and geologists who can access it using
the Internet and the company network.

He uses his own knowledge and the company’s expert system to predict the likelihood of a particular
mineral ore being found in the location.

Fergal connects the laptop to the company network using the Internet to send back his findings and to
keep in regular contact with the company and other inspectors.

The company also uses Fergal’s findings and those of its other inspectors and geologists to construct
computer models to predict where mineral ore deposits might be found.

© UCLES 2014 9713/32/O/N/14


3

1 (a) Describe how the facts in the knowledge base of the company’s expert system would have
been obtained.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Give two examples of the input data that would be needed from Fergal for use by the
company’s expert system.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/32/O/N/14 [Turn over


4

2 Discuss the advantages and disadvantages to the inspectors of using an expert system for mineral
prospecting.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/32/O/N/14


5

3 Describe three steps that are taken when constructing a computer model of an area being
prospected.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

......................................................................................................................................................[3]

4 Describe the purpose of these network components in the company network.

(a) hub ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) switch ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) wireless access point ................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(d) firewall .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2014 9713/32/O/N/14 [Turn over


6

5 (a) Explain how each protocol shown below could be used to obtain information from the company
network.

http ............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

FTP ...........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe two ways Fergal can ensure that his findings are kept secure while being transferred
to the company.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2014 9713/32/O/N/14


7

(c) Describe how Fergal could use the Internet for keeping in contact with the company and with
other company inspectors.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/32/O/N/14 [Turn over


8

Scenario 2
Questions 6, 7 and 8

Many people use online booking systems, online auctions and online transaction services.

A government agency has been set up to attempt to reduce the antisocial use of ICT and computer
fraud.

It is developing new security software to try to make people more confident about the security of their
personal data when using these services.

© UCLES 2014 9713/32/O/N/14


9

6 (a) Discuss the benefits and drawbacks of using the Internet to book tickets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) (i) What is meant by ‘computer fraud’?

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe the possible effects on victims of computer fraud.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

© UCLES 2014 9713/32/O/N/14 [Turn over


10

7 Describe, with examples, what is meant by ‘antisocial use of ICT’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2014 9713/32/O/N/14


11

8 Describe how timeline software would help the agency when creating its new security software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2014 9713/32/O/N/14 [Turn over


12

Scenario 3
Questions 9, 10 and 11

A regional government has asked Iqbal (a website designer), to create a new website which will include
facilities for:

• an online focus group


• weblogs
• wikis.

A new road is to be built through the region. The website facilities will allow citizens to register their
details and to have more influence on their political representatives during the building of this road.

Before the website is implemented, Iqbal must be confident that there are no security issues and must
appoint moderators for the online focus group.

© UCLES 2014 9713/32/O/N/14


13

9 Describe three different security problems and three different solutions that Iqbal must consider
before implementing the website.

Problem 1 .........................................................................................................................................

..........................................................................................................................................................

Solution 1 .........................................................................................................................................

..........................................................................................................................................................

Problem 2 .........................................................................................................................................

..........................................................................................................................................................

Solution 2 .........................................................................................................................................

..........................................................................................................................................................

Problem 3 .........................................................................................................................................

..........................................................................................................................................................

Solution 3 .........................................................................................................................................

......................................................................................................................................................[6]

10 Describe how, other than using focus groups, political representatives could use the Internet to
communicate with, and gather feedback from, citizens.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2014 9713/32/O/N/14 [Turn over


14

11 Iqbal will also organise an online focus group to discuss the building of the new road.

(a) Describe how an online focus group could be organised.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the advantages and disadvantages of using an online focus group to find out what
people think about the plans for the road.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2014 9713/32/O/N/14


15

BLANK PAGE

© UCLES 2014 9713/32/O/N/14


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2014 9713/32/O/N/14


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2014 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/32 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2014 series for
most Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

1 (a) Four from:


Named sensor such as light/infrared
…on satellite/NOAA/NASA/LANDSAT
Data mining from existing research documents
From expert geologists
…collected by appropriate method
…analysed and interpreted/entered into knowledge base [4]

(b) Two from e.g.:


Soil type/type of soil in the location
Chemicals in soil/soil composition
Density of soil
pH of soil
Details/descriptions of any ores found
Geological location of site
Geological makeup/details/landscape of site [2]

2 Eight from:

Advantages:
Contains the knowledge of many experts
Provide permanent record of process
Can enhance his own knowledge
Produce results quicker/reduces time taken to produce results
Fewer errors in work
No need to check with other inspectors/geologists if in doubt over findings
No need to carry/have access to paper records/information/reference books

Disadvantages:
Can lead to demotivation/less thought process by operative
Inspectors need to be trained to use the system
Expert system follows rules while operative might have “insight”/use common sense
Expert system does not easily adapt to new/different conditions
Expert system needs to be up-to-date to provide the most useful information for the inspectors to
use
Updating may take the system offline and make it unavailable

Maximum 6 marks for all advantages or all disadvantages


One mark available for a reasoned conclusion. [8]

3 Three from:
Analysing the geology of an area/location
Analyse/interpret the records/data of observations
Create a model describing the geology of the area e.g. rock boundaries/faults/water flow
Create a 3D representation of the area showing rock formations/likely mineral deposits/
fluid flow/oil in rocks/spaces between rocks [3]

© Cambridge International Examinations 2014


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

4 (a) Receives and/or sends packets


…to all devices connected to it
Broadcasts data packets [2]

(b) Direct flow of data packets to specific/individual devices connected to it


Stores details of mac address of connected device(s) in order to direct packets
…to attempt to avoid congestion on network [2]

(c) Use radio waves


…to connect into existing network [2]

(d) To control data traffic


To analyse traffic/checks (inspects) contents of data packets
To allow or deny access by network traffic
Blocks/allows IP addresses
…compares with block/allow list [2]

5 (a) Two from:


http: Web browser on client/laptop sends http request message
Company server sends http response/completion data to client/laptop
Application layer protocol using IP/TCP to transfer data
Web browser displays data using hypertext/markups in documents

Two from:
FTP: FTP client/application on laptop used to login in with user ID/password
Active or passive FTP mode selected depending on company server settings
Data type, e.g. ASCII/binary/EBCDIC, of data transfer determined
Mode, e.g. Stream/block/compressed, of data transfer selected [4]

(b) Four from e.g.:


Encrypt the data before sending
…using keys known only to him/recipient
Use secure/encrypted connection via wireless/Wi-Fi/cable
…use https connection
…use SSL connection
Avoid using public Wi-Fi hotspots
…to try to ensure that signals are not intercepted
Use secure VPN
…to connect over public telecommunications systems [4]

(c) Six from e.g.:


Email for sending messages and attachments
Electronic/video conferencing to discuss/share findings with other geologists
Use instant messaging services to discuss findings with other geologists
VoIP for voice phone calls findings with other geologists/report to offices
VPN for connection into company network
Webmail for email to sending messages and attachments/check messages
FTP for uploading files/downloading documents [6]

© Cambridge International Examinations 2014


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

6 (a) Six from:

Benefits:
Customers do not need to travel to make a booking so save travel costs/time
Customers can compare bookings with different companies
Customers can make bookings from anywhere
Customers can make bookings at any time
Customers has instant confirmation available
Reduced staff for branches/agents so saving money on salaries/wages
Customer base not restricted by time zones

Drawbacks:
Cannot authenticate customers for security purposes
No personal contact with customers/agents
Customers with special requirements may not be able to ask questions/get information online
Do not have street presence to attract new customers
Reliant on customers having internet access

Maximum 4 marks for all benefits or all drawbacks. [6]

(b) (i) The use of ICT/computer systems to intentionally deceive (others) for personal gain [1]

(ii) Four from, e.g:


Personal identities can be stolen
Money can be taken from bank accounts
Goods can be intercepted
Online tickets can be intercepted [4]

7 Eight from, e.g:


Use of ICT/computer systems
…to cause/inflict harm on others
Deleting/amending/distributing personal data
…gained from company/government databases
Misuse of personal data
…to gain access to services not entitled to
…to distribute SPAM emails
Spreading of viruses
…to cause harm to files/data
Cyberbullying
…with use of social networks/email/text messages [8]

8 Two from:
Create Gantt charts
Create PERT charts
…helps to identify the short and long term targets for the task of creating the software
…helps to prioritise the tasks
…helps to create a critical path [2]

© Cambridge International Examinations 2014


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

9 Any six points from (max 3 problems and 3 solutions):

Any 3 problems from:


Hackers attempting to access files and copy visitor credit card/personal details
Unauthorised alterations to web site/customer details
Security of data when customer details transferred/stored
Uploading of virus to site
Uploading of spyware
Spammer obtaining email addresses and sending spam
Denial of Service attack

Any 3 appropriate solutions from:


Firewall to control access by computers
Description of appropriate authentication technique
Use of encryption of data when being transferred or stored/use of secure website/https/SSL
Use of digital certification to verify website
Use of up to date anti-virus application
Use of anti-spyware software
Use of spam filtering software
Install a firewall, and configure it to restrict traffic coming into and leaving your computer [6]

© Cambridge International Examinations 2014


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

10 Methods from e.g.

Weblog:
Have a chronological record of postings
Perception of greater access
Can have multimedia elements
Consumes time to create and update
Unfiltered/uncensored

Emails:
Emails sent to registered subscribers
Send emails with information/attachments of newsletters

Website:
Information posted
Online questionnaires collect views

Forum:
Can be accessed from anywhere
Have a large audience
Wide range of users produces range of ideas and views
Usually only text-based
Malicious postings could be possible
Moderators/administrators can censor postings
Difficult to identify posters of malicious postings

e-Petitions:
Petition is set up on (government/politician) website
Petition checked for authenticity to ensure that
…there is not one already on that topic
…it does not contain confidential, libellous, false or defamatory statements
…it does not contain offensive, joke or nonsense content
Petition is available for anyone to sign

Social networks:
Use of social networks for “branding”/public image of politicians
Use for voter registration – collecting names of voters
Allow voters/supporters to express opinions/make comments on social network pages
Encourage voters/supporters follow/engage with politicians [6]

© Cambridge International Examinations 2014


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2014 9713 32

11 (a) Two from:


Use tele-conferencing to hold discussion
Members can log in at different times to post views/comments [2]

(b) Six from:

Advantages:
Members can be from all over the world/anywhere/wider range of views or opinions available
Timings do not have to take account of travel time
Travel and accommodation do not have to be arranged or paid for
Use of moderators to ensure appropriate language/tone of contributions
Contributors cannot remain anonymous
No need to employ staff/researchers so reduced costs

Disadvantages:
Organiser/moderator has less influence over the discussion
Contributors/citizens need IT skills/access to IT facilities
Interaction between organiser/moderator is reduced
Members often contribute less online than face-to-face
Reactions of members cannot be observed easily [6]

[Total: 80]

© Cambridge International Examinations 2014


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 5 4 3 2 1 3 5 3 3 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NF/FD) 101215/3
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3 and 4

East African Media Ltd, based in Nairobi, owns the African Times newspaper. It has built a new printing
plant in Mombasa, many kilometres away. The company also has a factory which manufactures rolls of
paper (newsprint) which are used to produce the newspaper.

The printing plant needs a constant room temperature for the printing presses to operate in.

To keep the temperature constant a microprocessor controlled air conditioning system is used.

Many of its reporters work in towns which are far away from the editor’s office in Nairobi.

They type up their stories and send them with any photographs by email to their editor.

The editor then sets the layout of the story using typesetting techniques on a computer.

East African Media Ltd uses the latest technology to print the newspaper. In order to print the paper in
Mombasa it requires the use of facsimile transmission. The company uses satellite communications to
fax a newspaper for printing.

© UCLES 2015 9713/13/M/J/15


3

1 Below is a diagram of a simple air conditioning system.

9DOYH

&RQGHQVLQJXQLW (YDSRUDWLQJXQLW

&RPSUHVVRU

For each statement below, tick the most appropriate answer.

(a) The compressor:


converts cool low-pressure gas into hot high-pressure gas.

causes the liquid to evaporate into cold low-pressure gas.

monitors the pressure of the refrigerant.

is essentially situated outside the building.

monitors the temperature of the refrigerant.


[1]

(b) The valve:


converts cool low-pressure gas into hot high-pressure gas.

causes the liquid to evaporate into cold low-pressure gas.

monitors the pressure of the refrigerant.

is essentially situated outside the building.

monitors the temperature of the refrigerant.


[1]

© UCLES 2015 9713/13/M/J/15 [Turn over


4

(c) The Condensing unit:


converts cool low-pressure gas into hot high-pressure gas.

causes the liquid to evaporate into cold low-pressure gas.

monitors the pressure of the refrigerant.

is essentially situated outside the building.

monitors the temperature of the refrigerant.


[1]

2 Tick the four statements referring to process control in this scenario which are true.

True

Keeping a constant temperature for the printing presses is an example of batch
process control.
Batch process control is used to produce extremely large amounts of product per
year.

Discrete process control is like an on/off or stop/start process.

The production of the rolls of paper is an example of continuous process control.

Continuous process control is used to produce relatively small amounts of


product per year.

There are four types of process control.

A PLC could be used to control the temperature for the printing presses.

Microprocessors are not involved in any aspect of process control.

Continuous process control is used in processes which appear to be unending.

Discrete process control is when the process is hidden.

[4]

© UCLES 2015 9713/13/M/J/15


5

3 (a) Describe what is meant by the term PLC.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe what is meant by the term PID.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

4 (a) Describe how the reporters would use ICT to produce their stories ready for emailing to the
editor’s office.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/13/M/J/15 [Turn over


6

(b) Describe the features of typesetting that the editor would use.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(c) Describe how a completed page would be transmitted from the editor’s office to the printing
presses in Mombasa.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9713/13/M/J/15


7

Scenario 2
Questions 5, 6 and 7

The WIMBA car company is producing a new model of car.

It wishes to advertise:
• all aspects of the company
• the car insurance it sells
• the new model of car.

It is planning to create its own advertising website.

Some workers in the advertising department work compressed hours whilst others work flexible hours.

Maria is the manager of the car assembly plant. She uses time management software in her work.

© UCLES 2015 9713/13/M/J/15 [Turn over


8

5 (a) For each example below name and describe the type of advertising that would be used.
For each type of advertising named, describe an example other than those used in the
scenario.

WIMBA ......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Insurance ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

New car model ..........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) A number of input devices are used to import information about the company and its cars for
inclusion in the website.

Describe, in detail, examples of multimedia information that would be imported using two
different input devices for inclusion in the website.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9713/13/M/J/15


9

(c) Describe four benefits to the company of creating their own advertising website.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(d) Describe the differences between pop ups and pop unders.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/13/M/J/15 [Turn over


10

6 (a) Describe the differences between working flexible hours and working compressed hours.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe two benefits to the worker of working flexible hours.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Describe two benefits to the company of workers working flexible hours.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9713/13/M/J/15


11

7 Maria uses a Gantt chart similar to the one below to plan the assembly of a car.

Activity 0600–1200 1200–1800 1800–2400 0000–0600 0600–1200 1200–1300


Assembling of
car body
Assembling the
chassis
Assembling of
car engine
Painting of car
body

Fitting of chassis

Quality control

Road testing the


finished car

(a) Identify two sequential activities in the Gantt chart shown.

...................................................................................................................................................

.............................................................................................................................................. [1]

(b) Identify two parallel activities in the Gantt chart shown.

...................................................................................................................................................

.............................................................................................................................................. [1]

(c) The stage of assembling the car body has been delayed by six hours. Describe, in detail, the
effects on each of the other activities in the Gantt chart.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/13/M/J/15 [Turn over


12

Scenario 3
Questions 8, 9, 10 and 11

Mendoza Electricity Group (MEG) is a company in Argentina which sells electricity to its customers.

The company operates a call centre for customers who have questions about their bill or wish to pay
their bills by phone using a credit or debit card. The call centre uses third party control.

Each customer has been given a twelve digit account number by MEG.

The company has a computerised system for producing bills. The company likes to update its master
file every week in terms of amendments, addition and deletion of records.

Every three months (quarter) the bills are produced using the batch processing of the master and
transaction files. No customer pays more than 16000 pesos.

The company has employed Andrew, a systems analyst, to update the existing system. He will design
validation rules to ensure the account numbers entered and the bill calculated are valid.

© UCLES 2015 9713/13/M/J/15


13

8 Describe four features of third party control.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..................................................................................................................................................... [4]

9 (a) Identify four items of information, apart from the account number that a customer would be
asked for if they were paying their bill by credit card.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe the processing that would take place to produce the customer’s quarterly bill.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/13/M/J/15 [Turn over


14

10 (a) MEG stores the master file and transaction file on magnetic tape.
Explain why the company uses magnetic tape.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) For each of these updating activities give one example related to the scenario.

Amendment ..............................................................................................................................

...................................................................................................................................................

Addition .....................................................................................................................................

...................................................................................................................................................

Deletion .....................................................................................................................................

.............................................................................................................................................. [3]

11 (a) After information has been collected about the existing system, Andrew will need to record it.
He could use Data Flow Diagrams or Systems Flowcharts.
Describe these methods.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/13/M/J/15


15

(b) Any validation rule used will need to be tested.


Using either the customer’s account number or the amount on their bill, as appropriate,
describe three testing strategies that could be used to test these validation rules. (You do not
have to name the validation rules).

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(c) Improvements may need to be made if the results of testing shows that the validation rules
still allow invalid data to be input.
Describe with examples three such improvements.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/13/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/13/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/13 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

1 (a) [1]

converts cool low-pressure gas into hot high-pressure gas 

causes the liquid to evaporate into cold low-pressure gas

monitors the pressure of the refrigerant

is essentially situated outside the building

monitors the temperature of the refrigerant

(b) [1]

converts cool low-pressure gas into hot high-pressure gas

causes the liquid to evaporate into cold low-pressure gas 

monitors the pressure of the refrigerant

is essentially situated outside the building

monitors the temperature of the refrigerant

(c) [1]

converts cool low-pressure gas into hot high-pressure gas

causes the liquid to evaporate into cold low-pressure gas

monitors the pressure of the refrigerant

is essentially situated outside the building 

monitors the temperature of the refrigerant

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

2 [4]

Keeping a constant temperature for the printing presses is an example


of batch process control.

Batch process control is used to produce extremely large amounts of


product per year.

Discrete process control is like an on/off or stop/start process 

The production of the rolls of paper is an example of continuous



process control

Continuous process control is used to produce relatively small


amounts of product per year.

There are four types of process control

A PLC could be used to control the temperature for the printing



presses

Microprocessors are not used in any aspect of process control

Continuous process control is used in processes which appear to be



unending

Discrete process control is when the process is hidden

3 (a) Three from: [3]

Programmable logic controller


A type of microprocessor/computer/microcomputer
Used for a single purpose
Can accept both analogue and digital inputs
Uses a set of logic statements
Compares input with a pre-set value
Activates output devices/actuator
Normally programmed to operate a machine/system using just one program
Used in systems where pre-set value is constant

(b) Three from: [3]

It’s a proportional–integral–derivative algorithm


Used when preset value is a constant
PID causes the PLC to make proportional changes
PID calculates difference between the input value and the preset value
Causes PLC to make proportional changes to the output
PID checks the difference again
Until preset value is reached

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

4 (a) Three from: [3]

Reporter types up/edits their story using word-processing software/DTP


Reporter types up/edits their story using laptop/keyboard
Takes photographs using a digital camera/phone
Import images from digital camera/phone
Edit images using picture/image editing software

(b) Three from: [3]

Correct font (type) has to be chosen


Correct font size has to be chosen
Kerning to (adjust the space between individual letters in word)
Amend the leading (- the space between lines on a page)

(c) Two from: [2]

(Digital) signals are used to send the pages up to a satellite


Transmitted by the satellite to the printing plant/presses

5 (a) WIMBA
Business [1]
Advertising of a single company + example [1]

Insurance
Service [1]
Advertising of services such as government/tourism/banking [1]

New car model


Product [1]
Advertising of a specific product + example [1]

(b) Two from: [2]

Video of the car/company could be imported from video camera/ digital camera
Vocal introduction to company could be input using microphone

(c) Four from: [4]

pop ups from the other company’s site may create unhappy customers who may avoid that
company in future/will have poor impression of the company/will tend to ignore them
Customers will use pop-up blocking (software) which does not allow their advertising on
other company’s website to appear
Can make their own website better suited to their needs
Own website has shorter delay in updating/improving advertising
Company has more control over its own website than it would over the host’s website
May be so many other companies’ advertising on host website the company’s may not be
seen/not as much advertising can be used/limited space available

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

(d) Four from: [4]

Pop-ups are small windows which suddenly appear in front of the web page user is working
on/pop-unders are small windows placed underneath the web page user is working on
Pop-up instantly grabs the attention of the customer/Pop-unders don’t appear to users until
they close the page they are working on.
Pop-unders are not removed by pop-up blocking/pop ups are blocked by pop up blocking
software

The customer regards pop-unders as less of an inconvenience than pop-ups

6 (a) Four from: [4]

Flexible hours refer to hours that are worked whereas compressed hours refer to days that
are worked
Flexible hours give workers some choice about what times of each day they work
Flexible hours can vary from day to day
Compressed hours would be fixed for those days which were being worked fully
Workers work the same number of hours each week with flexible hours
If compressed hours were spread over two weeks, would work more hours one week than
the next

(b) Two from: [2]

Allows workers to organise their working lives to suit their personal needs
Can choose to work off-peak hours as travelling to work outside peak times is easier and
cheaper
If workers stay late to finish a job, they can take time off at a later date
If the job requires great concentration, it can be done at quiet times of day

(c) Two from: [2]

Can match working hours with busy and not-so-busy times


Easier to allow for workers’ personal needs which leads to a reduction in absenteeism/
improved punctuality
Working flexitime hours would appeal to many technicians so it helps recruitment/reduces
the number of staff leaving for another job
Reduces the need for training new staff
Working flexitime hours is popular leading to greater productivity

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

7 (a) One pair from: [1]

Assembling of car body, painting of car body


Assembling of car body, fitting of chassis
Assembling of car body, road testing the finished car
Assembling the chassis, painting of car body
Assembling the chassis, fitting of chassis
Assembling the chassis, road testing the finished car
Assembling of car engine, painting of car body
Assembling of car engine, fitting of chassis
Assembling of car engine, road testing the finished car
Painting of car body, fitting of chassis
Quality control, road testing the finished car
Painting of car body, road testing the finished car
Fitting of chassis, road testing the finished car

(b) One pair from: [1]

Quality control with any activity except road testing

Or two of:

Assembling of car body


Assembling the chassis
Assembling of car engine

(c) Four from: [4]

Assembling the chassis, assembling of car engine are not affected


Painting of car body will now start at 0600/finish at 1200/delayed by six hours
Fitting of chassis will now start at 1200/finish at 1800/delayed by six hours
Quality control will be extended to 1800/extended by six hours
Road testing will now start at 1800/finish at 1900/delayed by six hours

8 Four from: [4]

Requires a dedicated telephony server


The operator’s phone communicates directly with the server
The server controls all the phones
Operator’s phone is not directly connected to their computer
Any computer in the system can be used to control any phone
The server controls all the phones
Allow supervisors, for example, to intervene if the call proves too complex for the operator to
handle
(The server) can direct a call to the appropriate operator
Suitable for large call centres

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

9 (a) Four from: [4]

Card number
Expiry date
Name (as shown on card)
Card Security Code
Address

(b) Four from: [4]

At the end of each billing period


Transaction file is sorted into same order as master file
Sorted on customer number
First record in the transaction file is read
First record in the old master file is read
If it matches, transaction is carried out
If records don’t match, computer writes master file record to new master file
Computer calculates the bill
Using cost of units from master file
Using units used from transaction file
Processed record is written to new master file
Bill is printed
Process is repeated until end of old master file

10 (a) Two from: [2]

Magnetic tape has serial access and the files would be sequential/batch processing required
Tapes have a greater longevity than most other media
Tapes are cheaper per unit of memory

(b) Amendment
Customers’ details change [1]
Addition
New customer [1]
Deletion
Customer closes account/dies [1]

© Cambridge International Examinations 2015


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 13

11 (a) Data flow diagram [3]


Using (two from :) terminators, processes, flow arrows and stores
The diagram would represent inputs, outputs and processing

System flowcharts
Using particular input, output, storage and processing symbols
The diagram would represent inputs, outputs and processing (only if not given for DFDs)

(b) Two from: [6]

(Use of live/normal data) such as a number between 0 and 16000 for the bill
(Use of live/normal data) such as a customer number which is exactly 12 characters
(Use of live/normal data) such as a customer number which is digits only
This data should be accepted by the system

Two from:

(Use of abnormal data) such as 16001 or “sixteen thousand”


(Use of abnormal data) such as a customer number which is less than or greater than 12
characters
(Use of abnormal) such as a customer number which contains text
This data should be rejected by the system

Two from:

(Use extreme data) such as 0 or 16000 for the customer bill


This data should be accepted by the system

(c) Three from: [3]

Amend rule to ensure the acceptable value for the bill is >= and <= and not just > and <
Amend rule to ensure that it uses 0 to 16000
Amend rule to ensure it checks it is numeric
Amend rule to make sure < has not been used instead of > and vice versa
Amend rule to ensure length check is 12 exactly
Field descriptions are included which adequately inform about field contents

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 9 5 5 3 2 0 8 7 2 2 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NH) 101216/2
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2 and 3

Computer Assist is a company that provides computing facilities for disabled people.

The computers allow disabled people to access the internet to view websites and to use commercial
and government online services.

The company provides additional, specialised hardware for its computers and specialised software is
installed for use by disabled people.

© UCLES 2015 9713/31/M/J/15


3

1 (a) Describe how disabled people could use specialist software to convert between text and
speech.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Name and describe two other methods that can assist disabled people to enter data into a
computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/31/M/J/15 [Turn over


4

2 Explain how access by disabled people to each of the following services has been increased by
use of the internet.

(a) Health services

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Employment opportunities

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/31/M/J/15


5

3 Describe three features of some websites that could make it difficult for viewing by visually
impaired people.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/31/M/J/15 [Turn over


6

Scenario 2
Questions 4, 5, 6, 7 and 8

Desirable Outfits sells goods from a number of shops.

The shops are connected to a computerised stock control system using Point of Sale (POS) terminals.

Desirable Outfits supplies its shops from a central warehouse and uses a computerised ‘just-in-time’
stock control system.

Desirable Outfits wants to increase its sales by advertising in the media using newspapers, radio and
television.

Desirable Outfits uses mailmerge to contact selected customers about a new clothing range.

Mahmoud has been invited for interview at head office and will need to travel by train.

© UCLES 2015 9713/31/M/J/15


7

4 (a) Describe the steps that Mahmoud would take in order to buy a train ticket online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Discuss the benefits and drawbacks of buying train tickets online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/31/M/J/15 [Turn over


8

5 (a) Describe what is meant by a ‘just-in-time’ stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe the benefits and drawbacks to Desirable Outfits of using a computerised ‘just-in-
time’ stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/31/M/J/15


9

6 Describe how variable fields are set up in the mailmerge to control the selection of customers who
will receive the information about the new clothing range.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/31/M/J/15 [Turn over


10

7 (a) Describe how hardware and software are used in a computerised automatic stock control
system linked to POS terminals.

(i) Hardware ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Software ............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Describe the processing carried out by a computerised stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/31/M/J/15


11

8 Describe three ways that Desirable Outfits could carry out market research to find out the
effectiveness of its advertising in the media.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/31/M/J/15 [Turn over


12

Scenario 3
Questions 9, 10, 11 and 12

Colin is a network administrator responsible for a company network that allows employees to access
its facilities from within the company buildings and from outside. The company uses dedicated cabling
within its buildings.

The network is used by employees who work in the company buildings and there is an extranet for use
by employees who work from home and when travelling on business.

Various protocols are used to transfer data over a network.

Colin uses Telnet and Secure Shell (SSH) for maintaining and administering the computers and servers
on the network. Telnet and SSH are network protocols used in some client server systems.

© UCLES 2015 9713/31/M/J/15


13

9 (a) Describe what is meant by an extranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the benefits and drawbacks of having an extranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(c) Explain why the company uses dedicated cabling for its network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/31/M/J/15 [Turn over


14

10 Describe what is meant by a client server system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

11 Explain why Colin prefers to use SSH rather than Telnet for administering the network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

© UCLES 2015 9713/31/M/J/15


15

12 Name and describe the features of two protocols, other than SSH and Telnet, that could be used
on the network to transfer data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/31/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/31/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION & COMMUNICATION


TECHNOLOGY
9713/31 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

1 (a) Descriptions from: [4]

Text to speech software is:


Used to convert text that appears on screen into computer generated words/speech
To ‘read’ documents aloud/from a speaker
For those unable to see the screen properly

Speech to text software is:


Speak into a microphone
Used to convert spoken words into text on screen
To create documents
For those unable to use keyboards

(b) Two descriptions from e.g.: [4]

Sticky keys: no need to press two keys at once/press first key followed by second to get
action
Filter keys: ignores brief or repeated key presses
Head pointer: have a camera on top of monitor to detect head movements/physical device on
head to tap keys
Overlay (concept) keyboard: overlay with larger characters that can be easily picked out
Magnifier/Zoom software: to enlarge text/areas of the screen so that these can be seen
better
Predictive text: to complete/suggest words/sentences from a few characters/words

2 (a) Descriptions from e.g.: [4]

Online consultations with a doctor or nurse


…so no need to physically visit the doctor/doctor does not need to visit the patient
…save time/expense of traveling to doctor/doctor to patient
…patient may have difficulty in travelling/being moved
…speech or hearing difficulties are overcome
Health information available on internet
…easier to research
Ordering medicines online
…cheaper to buy/reduces travel/collection cost

(b) Descriptions from e.g.: [4]

Can work from home


…no need for employer to provide disabled facilities
…in own environment
Can work for several employers simultaneously
…can time share jobs
Can apply for jobs/courses online
…can send resumes/CVs by email/electronically
…no need to travel/no need to make difficult journeys

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

3 Three descriptions from e.g.: [6]

Hard-coded font size


…so cannot be changed by viewer
Websites not customised for specialist browsers
…some features of site e.g. shopping basket not available/displayed incorrectly or not at all
Too much animation/video
…distracting and confusing
Too many popups/adverts
…intrusive and distracting
Colour combinations
…unable to distinguish colours/text/content

4 Five from: [5]

Access rail company website


Select journey details – departure and destination/return journey
Select journey time
Select number of tickets
Enter any discount codes/options for journey e.g. class of travel
Enter payment details
Note confirmation code/receive confirmation email
Print/collect tickets

(b) Benefits from e.g.: [6]

Guaranteed a seat
No double booking
Choose lowest price/compare prices
Easier to choose route
Easier to choose time

Drawbacks from e.g.:

Have to use same debit/credit card to collect tickets


Have to remember the unique booking code
Cannot change tickets
Lack of personal touch/cannot discuss options
Cannot pay with cash

Max 5 for all benefits or drawbacks

5 (a) Two from: [2]

Order placed as goods are running out of stock


Goods arrive at distribution point as required
Goods arrive in time to be used immediately

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

(b) Benefits from e.g.: [6]

Lower warehouse costs


…no excess inventory has to be stored
…number/size of warehouses is reduced
Lower supply chain costs
…company products more affordable so more are sold
Increased customer satisfaction
…items in great demand are supplied to stores quickly/stock does not run out
Less waste/overstocking of items
…fewer unsold items
Company can respond to customer demand
…items that sell well always in stock
…items that do not sell well are not overstocked

Drawbacks from e.g.:

Goods not delivered to the shop exactly on time/in the correct amounts could adversely
affect the sales in shops
Shop has to anticipate projected sales so orders can be placed in time for delivery
The warehouse may not be able to immediately meet the requirements of a massive and
unexpected order from a shop
…since it has few or no stocks available/left after orders from other shops
…a road traffic problem/transport problem/natural disaster could impede the flow of goods to
the shop from the warehouse so goods do not arrive/are late in arrival

Max 5 for all benefits or all drawbacks

6 Four from: [4]

Insert field for customer into document


Use operands to select/filter/omit customer
Use of variable field containing/to test conditions
…use of IF, NEXT, COMPARE, SKIPIF, IF-THEN-ELSE
At mail merge runtime

7 (a) (i) Hardware: [2]

Bar code reader to read product ID number


Electronic scales to weigh products/items/to check correct item has been placed in
bagging area
Keyboard/keypad to input product ID if barcode cannot be read/quantity
Speakers to output alarms/beeps if there is an error/correctly scanned
Sensors to detect presence of item

(ii) Software: [2]

Bar code reading software to convert barcode into product ID


Database to store/update stock quantity
…to output prices
(Allow two database answers)

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

(b) Six from: [6]

Product ID looked up in database


If found product details returned
If not found, error message generated
If sold, number of products sold deducted from number in stock
…new number written back to file
When re-order level reached more stock ordered automatically
…item flagged as order has been placed
When new items arrive, database updated

8 Three ways from e.g.: [6]

Research in the media


…show trial advert to audience
…collect data on audience response
…adjust advert accordingly
Research public opinion
…phone prospective customers
…canvas customers about clothes products
Computer Assisted Personal Interviewing where both interviewer and interviewee are together in
same room
• questions are put by the computer program
• interviewer asks questions as prompted by computer program
• an interviewer keys in responses from interviewee directly into a purpose-built computer
program on a small device or on a laptop
Computer Assisted Telephone Interviewing where interviewer is usually in a call centre
• using software based systems to make calls and then connect interviewer with
interviewee
• interviewer asks questions as prompted by the computer program
• keys in responses from interviewee directly into a purpose-built computer program
Computer Aided Web Interviewing where interviewee accesses online questionnaire
• interviewees need access to internet and web browser
• questions are multiple choice
• computer used responses to one question to choose next question to ask
• use of branching logic statements to choose which questions to ask

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

9 (a) Two from: [2]

A (computer) network/intranet
…with controlled access from outside the intranet

(b) Five from: [5]

Benefits:
Allows customers to access facilities of intranet/website
Allows employees to access facilities of intranet/website
Allows suppliers to access facilities of intranet/website
Exchange data using Electronic Data Interchange (EDI)
Share product catalogues exclusively with other traders
Collaborate with other companies on joint designs
Provide or access services provided by one company to a group of other companies, e.g. an
online banking application managed by one company on behalf of affiliated banks

Drawbacks:
Extranets can be expensive to implement and maintain within an organisation
… (e.g. hardware, software, employee training costs)
…by an external application service provider
Security issues are of concern if the data is valuable

Max 4 marks for all benefits or drawbacks

(c) Two from: [2]

Dedicated cabling is more secure than wireless/Wi-Fi


Higher data transfer speeds are available
Can reach all parts of the building

10 Three from: [3]

The server is a host that is running one or more server programs


…whose resources are shared with clients
Client does not share any of its resources with server
Client initiates communication sessions
…server that waits for incoming requests from client(s)
…client requests/asks for content from server
…client requests/asks for service function from server
Different computers/OS can be clients of the server

11 Three from: [3]

SSH enables secure exchange of data between computers when using unsecured networks such
as the internet
SSH enables log into remote computer to execute commands on remote computer/server
Telnet is insecure/SSH is more secure
SSH uses encryption
…uses public key authentication/key needed for decryption
…data if intercepted cannot be read

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 31

12 Two protocols e.g.: [4]

UDP
…does not require hand-shaking
…before data can be transferred
…data sent to address of computer
…no checking that data has arrived

TCP/IP
…defines the packet structure
…allows routing of packets

HTTP
…used to transfer data for web pages

FTP
…peer to peer transfer of files

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 3 4 7 5 7 2 7 6 0 5 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

DC (NF) 101349/3
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2 and 3.

Stoner school has a cabled local area network (LAN) and a wireless local area network (WLAN) that
allows users to share peripherals, to exchange data and to access the internet.

The network uses a variety of protocols to transfer data.

A user is required to provide a UserID (user name) and a password when logging into the network.

© UCLES 2015 9713/32/M/J/15


3

1 (a) Describe how the UserID (user name) is processed to allow the user to gain access to the
network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe how the entry of a password by a user completes the login process.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/32/M/J/15 [Turn over


4

2 (a) Describe two benefits to staff and students of using the WLAN.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe two drawbacks to staff and students of using the WLAN.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/32/M/J/15


5

3 Tick one box in each table to choose the most appropriate protocol for each of the tasks listed.

(a) Downloading a file over the internet.

()

FTP

https

SSH

Telnet

UDP

[1]

(b) Transferring a web page from a server to a client computer.

()

FTP

https

SSH

Telnet

UDP

[1]

(c) Remote access to a computer.

()

FTP

https

SSH

Telnet

UDP

[1]

© UCLES 2015 9713/32/M/J/15 [Turn over


6

(d) Streaming video over a network.

()

FTP

https

SSH

Telnet

UDP

[1]

© UCLES 2015 9713/32/M/J/15


7

Scenario 2
Questions 4, 5, 6, 7 and 8.

A bridge is to be constructed across a river.

The bridge will be modelled in a computer system and a scale model prototype will be built before the
real bridge is constructed.

Computer Aided Design and Computer Aided Manufacture software (CAD/CAM) will be used to create
the prototype.

A mainframe computer will be used to create and test a computer model of the bridge.

Project management software is to be used to create a project plan for the building of the bridge.

© UCLES 2015 9713/32/M/J/15 [Turn over


8

4 Describe how features of CAD/CAM could be used to create the prototype of the bridge for testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

5 Explain why a mainframe computer was chosen to create and test a computer model of the bridge.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [2]
© UCLES 2015 9713/32/M/J/15
9

6 (a) Describe two advantages of using a computer model to test the bridge.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Describe two disadvantages of using a computer model to test the bridge.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9713/32/M/J/15 [Turn over


10

7 Describe two features of project management software that could be used to organise the stages
of the planning and construction of the bridge.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

8 Designing and testing a prototype are two stages in the construction project that must be scheduled
in the project plan.

State three other stages in the bridge construction that must be scheduled.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2015 9713/32/M/J/15


11

Scenario 3
Questions 9, 10, 11 and 12.

Governments provide online facilities to increase access to employment opportunities and to health,
legal and political services.

The digital divide is the gap between individuals and groups of people who are able to make effective
use of ICT and those who are not able to do so.

The digital divide affects many areas including access to health services and employment opportunities.

© UCLES 2015 9713/32/M/J/15 [Turn over


12

9 Explain, with an example, what is meant by the global digital divide.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/32/M/J/15


13

10 Explain how the digital divide can limit people’s employment opportunities.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9713/32/M/J/15 [Turn over


14

11 Discuss the benefits and drawbacks of individuals being able to access legal information online.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.…….….………..................……………………………………..………………….………………............

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9713/32/M/J/15


15

12 Explain how the digital divide can affect access to health services.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2015 9713/32/M/J/15 [Turn over


16

Scenario 4
Questions 13, 14 and 15.

Sensors are used to collect data about physical variables. The data is sent to a computer for storage
and analysis.

Weather stations use sensors to collect data about the weather such as the temperature and barometric
pressure.

Hospitals use sensors to collect data, such as body temperature and blood pressure, which are used
by computers for monitoring patients in intensive care units.

© UCLES 2015 9713/32/M/J/15


17

13 Other than sensors for measuring temperature and barometric pressure, state four sensors that
could be used when monitoring the weather and describe a use for each.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

14 Describe how the data from sensors could be used for monitoring a patient in an intensive care
unit.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/32/M/J/15 [Turn over


18

15 Explain the benefits and drawbacks of monitoring patients using computers in an intensive care
unit.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9713/32/M/J/15


19

BLANK PAGE

© UCLES 2015 9713/32/M/J/15


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/32/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION & COMMUNICATION


TECHNOLOGY
9713/32 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

1 (a) Three from: [3]


database of UserIDs stored on system
system checks entered User ID against database (of user IDs on server)
when it finds a match it retrieves details such as passwords
(when password entered), system allows access based on UserID
...and allocates privileges
...if server cannot find User ID, login is rejected

(b) Three from: [3]


database of passwords linked to UserIDs stored on system
system checks the password against database of passwords/stored passwords
...to check that the password is associated with the entered User ID
if password found, login is completed
if password is incorrect, user is asked to retype password
if e.g. three failed attempts are made, then login is rejected for that User ID

2 (a) Two benefits from e.g.: [4]


can access WLAN from anywhere within range/building
...can be mobile/move around
...can use same device anywhere in building
can access same peripherals e.g. printers while mobile
can use own devices
...at home and at school
health/safety issue e.g. reduced trip hazard from trailing cables
can have extended network coverage beyond the wired LAN

(b) Two drawbacks from e.g.: [4]


security concerns
...WLANs must use security keys
...security key will be known to many
...less secure than a wired connection
interference from other devices
...reduces data transfer rates leading to apparent slower speeds of e.g. web access
increased distance from connection/access point
...low signal strength
...can lead to loss of connectivity
bandwidth is lower than cabled networks
...reduces data transfer rates leading to apparent slower speeds of e.g. download
...large number of users can lead to slower rate of data transfer

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

3 (a) Tick as shown: [1]

()

FTP 

https

SSH

Telnet

UDP

(b) Tick as shown: [1]

()

FTP

https 

SSH

Telnet

UDP

(c) Tick as shown: [1]

()

FTP

https

SSH

Telnet 

UDP

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

(d) Tick as shown: [1]

()

FTP

https

SSH

Telnet

UDP 

4 Eight from: [8]


CAD
design accurate drawings of bridge components
...using database/library of pre-prepared components to speed up design process
component tested before produced
...under variety of conditions
3D views to allow walk-around/view final product
total cost of a product can be calculated
…using a database of parts held by program
CAM
Computer Aided Manufacture linked to computer system
CAD generates a list of instructions
..for the manufacturing device/lathe/3D printer
to cut components to designed dimensions
using LOGO type commands
to set the dimensions of the prototype

5 Two from: [2]


mainframes have high processing power/fast processing speed
vast amount of data to be processed
...which would take too long if done by human/non-mainframe computer
large number of rules/parameters to be processed

6 (a) Two from e.g.: [2]


parameters can be changed
model can be tested to destruction
tests can be repeated
extreme conditions can be modelled
no danger of hurting people
no materials wasted
can investigate the financial implications of different designs

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

(b) Two from e.g.: [2]


not all parameters can be modelled/tested so test is incomplete
the assumptions/rules of the model may be faulty/not accurate so test results may not be
accurate
custom software is needed for large/complex models which maybe expensive/take too long
to produce
need access to fast/mainframe for large/complex models which may be expensive

7 Two from: [4]


Gantt charts:
...show clearly the stages /tasks in project
...can be used as a communication device between team members
...permits time management of project
...allows flexibility in project management
...parallel and sequential tasks with appropriate examples can be represented
...progress of each task with appropriate example can be shown

Pert (Project Evaluation and Review Technique) Charts:


facilitates decision making
...number events sequentially to allow the later insertion of additional events
two consecutive events in a PERT chart are linked by activities
...represented as arrows
events shown in a logical sequence
...no activity can commence until its immediately preceding event is completed
milestones should be PERT events and decides their “proper” sequence
may have multiple pages with many sub-tasks
Critical path analysis
...to determine the most cost-effective/time-effective order of tasks
Event chain diagrams
events are shown as arrows
...names and/or IDs of events are shown next to the arrow
events with negative impacts (risks) are represented by down arrows
events with positive impacts (opportunities) are represented by up arrows
individual events are connected by lines showing the event chain
PRINCE
divides project into number of processes
uses common language so all can understand

Max 3 per feature

8 Three from e.g: [3]


hiring (construction) workers
preparing the ground
building foundations
construct main supports
constructing bridge sections
delivery of bridge sections
testing of construction
project completion

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

9 Four from: [4]


disparities/gap
...between developed and developing countries/regions
regarding access to computing/ICT
regarding skills in computing/ICT
regarding opportunities related to computing/ICT

One mark for valid example e.g. access to internet

10 Eight from e.g.: [8]


ICT skills enhance employment prospects
people in some countries/regions may not have access to computers/IT facilities
infrastructure, people in some countries/regions may not support computers/IT facilities
people lacking ICT skills will not be employed so easily
people lacking ICT skills will not be able to use ICT to search for jobs
people lacking ICT skills will not be able to use ICT to apply for jobs
people lacking ICT skills will not be able to use ICT to create CVs
areas lacking ICT infrastructure will not be able to access advertising for jobs/job searches
schools and colleges without ICT access cannot teach ICT skills
richer schools have ICT facilities to teach their students so increasing the digital divide/providing
employable skills for their students

11 Eight from e.g.: [8]

Benefits:
access to legal information from e.g. home
no need to book an appointment with lawyer
...some people may be intimidated by lawyers
...reduced costs e.g. travel costs
access to legal information without having to pay law firms
can access the information whenever it is convenient
access to information on family matters e.g. divorce, child care without visiting a lawyer
access to advice on e.g. house purchases without paying estate agents fees
access to changes in regulations and laws/updated regulations and laws
online consultations with lawyers to get personalised advice

Drawbacks:
legal advice may be misinterpreted/not understood
online data may be deliberately altered to mislead
unqualified people may use advice and mislead others
individuals may not be able to find/make of all the relevant information

Max 6 for all benefits or all drawbacks

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 32

12 Five from e.g.: [5]


areas with good access to ICT have better access to (online) health services
areas with poor access have reduced/no access to (online) health services
online consultations possible in areas with ICT access
...not possible in areas without access to ICT
disabled people/valid example with ICT skills have increased access to health services
...those without the skills cannot get access health services without e.g. travelling
updated/general health information is available on the internet for those with ICT access
...those without ICT access are denied the health information updates

13 Four sensors from e.g.: [4]


humidity to measure water in air
anemometer speed of wind
angle sensor direction of wind
tipping sensor rainfall
light sensor sunshine/light

14 Four from: [4]


sensors to measure the variable when connected to patient
data from physical variables sent to computer system
.. via ADC
example of physical variable e.g. breathing rate
computer analyses data/compares with pre-set data
displays results on monitor for viewing by nurses/doctors
computer produces alert/warning if physical variables go outside set parameters

15 Eight from e.g: [8]

Benefits:
automatic recording of data from patient for review
automatic chart production for reports/analysis by medical staff
remote monitoring of patient
...nurses can be alerted quickly
computers can monitor more than one variable per patient simultaneously
computers can monitor many patients at once
...nurses can supervise/watch over many patients at once
...nurses are freed up to other tasks
patients monitored 24/7
patients monitored continuously

Drawbacks:
patient does not get personal care
not all parameters may be monitored (e.g. blood sugar level)
alarm may be overlooked/ignored
cost of equipment purchase/maintenance
power failure/computer failure can cause loss of data/monitoring/affect patient safety

Max six for all benefits or all drawbacks.

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 3 5 4 4 8 0 7 9 7 4 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (FD) 110077
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2 and 3

Computer Assist is a company that provides computing facilities for disabled people.

The computers allow disabled people to access the internet to view websites and to use commercial
and government online services.

The company provides additional, specialised hardware for its computers and specialised software is
installed for use by disabled people.

© UCLES 2015 9713/33/M/J/15


3

1 (a) Describe how disabled people could use specialist software to convert between text and
speech.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Name and describe two other methods that can assist disabled people to enter data into a
computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/33/M/J/15 [Turn over


4

2 Explain how access by disabled people to each of the following services has been increased by
use of the internet.

(a) Health services

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Employment opportunities

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/33/M/J/15


5

3 Describe three features of some websites that could make it difficult for viewing by visually
impaired people.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/33/M/J/15 [Turn over


6

Scenario 2
Questions 4, 5, 6, 7 and 8

Desirable Outfits sells goods from a number of shops.

The shops are connected to a computerised stock control system using Point of Sale (POS) terminals.

Desirable Outfits supplies its shops from a central warehouse and uses a computerised ‘just-in-time’
stock control system.

Desirable Outfits wants to increase its sales by advertising in the media using newspapers, radio and
television.

Desirable Outfits uses mailmerge to contact selected customers about a new clothing range.

Mahmoud has been invited for interview at head office and will need to travel by train.

© UCLES 2015 9713/33/M/J/15


7

4 (a) Describe the steps that Mahmoud would take in order to buy a train ticket online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Discuss the benefits and drawbacks of buying train tickets online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/33/M/J/15 [Turn over


8

5 (a) Describe what is meant by a ‘just-in-time’ stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe the benefits and drawbacks to Desirable Outfits of using a computerised ‘just-in-
time’ stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/33/M/J/15


9

6 Describe how variable fields are set up in the mailmerge to control the selection of customers who
will receive the information about the new clothing range.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/33/M/J/15 [Turn over


10

7 (a) Describe how hardware and software are used in a computerised automatic stock control
system linked to POS terminals.

(i) Hardware ...........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Software ............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Describe the processing carried out by a computerised stock control system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/33/M/J/15


11

8 Describe three ways that Desirable Outfits could carry out market research to find out the
effectiveness of its advertising in the media.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/33/M/J/15 [Turn over


12

Scenario 3
Questions 9, 10, 11 and 12

Colin is a network administrator responsible for a company network that allows employees to access
its facilities from within the company buildings and from outside. The company uses dedicated cabling
within its buildings.

The network is used by employees who work in the company buildings and there is an extranet for use
by employees who work from home and when travelling on business.

Various protocols are used to transfer data over a network.

Colin uses Telnet and Secure Shell (SSH) for maintaining and administering the computers and servers
on the network. Telnet and SSH are network protocols used in some client server systems.

© UCLES 2015 9713/33/M/J/15


13

9 (a) Describe what is meant by an extranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Discuss the benefits and drawbacks of having an extranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(c) Explain why the company uses dedicated cabling for its network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/33/M/J/15 [Turn over


14

10 Describe what is meant by a client server system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

11 Explain why Colin prefers to use SSH rather than Telnet for administering the network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

© UCLES 2015 9713/33/M/J/15


15

12 Name and describe the features of two protocols, other than SSH and Telnet, that could be used
on the network to transfer data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/33/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/33/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION & COMMUNICATION


TECHNOLOGY
9713/33 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

1 (a) Descriptions from: [4]

Text to speech software is:


Used to convert text that appears on screen into computer generated words/speech
To ‘read’ documents aloud/from a speaker
For those unable to see the screen properly

Speech to text software is:


Speak into a microphone
Used to convert spoken words into text on screen
To create documents
For those unable to use keyboards

(b) Two descriptions from e.g.: [4]

Sticky keys: no need to press two keys at once/press first key followed by second to get
action
Filter keys: ignores brief or repeated key presses
Head pointer: have a camera on top of monitor to detect head movements/physical device on
head to tap keys
Overlay (concept) keyboard: overlay with larger characters that can be easily picked out
Magnifier/Zoom software: to enlarge text/areas of the screen so that these can be seen
better
Predictive text: to complete/suggest words/sentences from a few characters/words

2 (a) Descriptions from e.g.: [4]

Online consultations with a doctor or nurse


…so no need to physically visit the doctor/doctor does not need to visit the patient
…save time/expense of traveling to doctor/doctor to patient
…patient may have difficulty in travelling/being moved
…speech or hearing difficulties are overcome
Health information available on internet
…easier to research
Ordering medicines online
…cheaper to buy/reduces travel/collection cost

(b) Descriptions from e.g.: [4]

Can work from home


…no need for employer to provide disabled facilities
…in own environment
Can work for several employers simultaneously
…can time share jobs
Can apply for jobs/courses online
…can send resumes/CVs by email/electronically
…no need to travel/no need to make difficult journeys

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

3 Three descriptions from e.g.: [6]

Hard-coded font size


…so cannot be changed by viewer
Websites not customised for specialist browsers
…some features of site e.g. shopping basket not available/displayed incorrectly or not at all
Too much animation/video
…distracting and confusing
Too many popups/adverts
…intrusive and distracting
Colour combinations
…unable to distinguish colours/text/content

4 Five from: [5]

Access rail company website


Select journey details – departure and destination/return journey
Select journey time
Select number of tickets
Enter any discount codes/options for journey e.g. class of travel
Enter payment details
Note confirmation code/receive confirmation email
Print/collect tickets

(b) Benefits from e.g.: [6]

Guaranteed a seat
No double booking
Choose lowest price/compare prices
Easier to choose route
Easier to choose time

Drawbacks from e.g.:

Have to use same debit/credit card to collect tickets


Have to remember the unique booking code
Cannot change tickets
Lack of personal touch/cannot discuss options
Cannot pay with cash

Max 5 for all benefits or drawbacks

5 (a) Two from: [2]

Order placed as goods are running out of stock


Goods arrive at distribution point as required
Goods arrive in time to be used immediately

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

(b) Benefits from e.g.: [6]

Lower warehouse costs


…no excess inventory has to be stored
…number/size of warehouses is reduced
Lower supply chain costs
…company products more affordable so more are sold
Increased customer satisfaction
…items in great demand are supplied to stores quickly/stock does not run out
Less waste/overstocking of items
…fewer unsold items
Company can respond to customer demand
…items that sell well always in stock
…items that do not sell well are not overstocked

Drawbacks from e.g.:

Goods not delivered to the shop exactly on time/in the correct amounts could adversely
affect the sales in shops
Shop has to anticipate projected sales so orders can be placed in time for delivery
The warehouse may not be able to immediately meet the requirements of a massive and
unexpected order from a shop
…since it has few or no stocks available/left after orders from other shops
…a road traffic problem/transport problem/natural disaster could impede the flow of goods to
the shop from the warehouse so goods do not arrive/are late in arrival

Max 5 for all benefits or all drawbacks

6 Four from: [4]

Insert field for customer into document


Use operands to select/filter/omit customer
Use of variable field containing/to test conditions
…use of IF, NEXT, COMPARE, SKIPIF, IF-THEN-ELSE
At mail merge runtime

7 (a) (i) Hardware: [2]

Bar code reader to read product ID number


Electronic scales to weigh products/items/to check correct item has been placed in
bagging area
Keyboard/keypad to input product ID if barcode cannot be read/quantity
Speakers to output alarms/beeps if there is an error/correctly scanned
Sensors to detect presence of item

(ii) Software: [2]

Bar code reading software to convert barcode into product ID


Database to store/update stock quantity
…to output prices
(Allow two database answers)

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

(b) Six from: [6]

Product ID looked up in database


If found product details returned
If not found, error message generated
If sold, number of products sold deducted from number in stock
…new number written back to file
When re-order level reached more stock ordered automatically
…item flagged as order has been placed
When new items arrive, database updated

8 Three ways from e.g.: [6]

Research in the media


…show trial advert to audience
…collect data on audience response
…adjust advert accordingly
Research public opinion
…phone prospective customers
…canvas customers about clothes products
Computer Assisted Personal Interviewing where both interviewer and interviewee are together in
same room
• questions are put by the computer program
• interviewer asks questions as prompted by computer program
• an interviewer keys in responses from interviewee directly into a purpose-built computer
program on a small device or on a laptop
Computer Assisted Telephone Interviewing where interviewer is usually in a call centre
• using software based systems to make calls and then connect interviewer with
interviewee
• interviewer asks questions as prompted by the computer program
• keys in responses from interviewee directly into a purpose-built computer program
Computer Aided Web Interviewing where interviewee accesses online questionnaire
• interviewees need access to internet and web browser
• questions are multiple choice
• computer used responses to one question to choose next question to ask
• use of branching logic statements to choose which questions to ask

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

9 (a) Two from: [2]

A (computer) network/intranet
…with controlled access from outside the intranet

(b) Five from: [5]

Benefits:
Allows customers to access facilities of intranet/website
Allows employees to access facilities of intranet/website
Allows suppliers to access facilities of intranet/website
Exchange data using Electronic Data Interchange (EDI)
Share product catalogues exclusively with other traders
Collaborate with other companies on joint designs
Provide or access services provided by one company to a group of other companies, e.g. an
online banking application managed by one company on behalf of affiliated banks

Drawbacks:
Extranets can be expensive to implement and maintain within an organisation
… (e.g. hardware, software, employee training costs)
…by an external application service provider
Security issues are of concern if the data is valuable

Max 4 marks for all benefits or drawbacks

(c) Two from: [2]

Dedicated cabling is more secure than wireless/Wi-Fi


Higher data transfer speeds are available
Can reach all parts of the building

10 Three from: [3]

The server is a host that is running one or more server programs


…whose resources are shared with clients
Client does not share any of its resources with server
Client initiates communication sessions
…server that waits for incoming requests from client(s)
…client requests/asks for content from server
…client requests/asks for service function from server
Different computers/OS can be clients of the server

11 Three from: [3]

SSH enables secure exchange of data between computers when using unsecured networks such
as the internet
SSH enables log into remote computer to execute commands on remote computer/server
Telnet is insecure/SSH is more secure
SSH uses encryption
…uses public key authentication/key needed for decryption
…data if intercepted cannot be read

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2015 9713 33

12 Two protocols e.g.: [4]

UDP
…does not require hand-shaking
…before data can be transferred
…data sent to address of computer
…no checking that data has arrived

TCP/IP
…defines the packet structure
…allows routing of packets

HTTP
…used to transfer data for web pages

FTP
…peer to peer transfer of files

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 0 0 6 2 5 0 4 5 8 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 13 printed pages and 3 blank pages.

DC (LEG/FD) 101217/3
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

XYA is a company in a developing country that buys and sells steel. They employ a number of sales
staff to phone potential customers in order to sell their steel.

They are seeking to save costs and have asked a number of their sales staff to work from home.
Temperatures are fairly low in the winter so sales staff tend to have central heating systems in their
homes.

Regular staff meetings are planned to take place using phone conferencing which the manager Ibrahim
will organise.

© UCLES 2015 9713/11/M/J/15


3

1 Tick the four statements which are benefits to the company of workers working from home.

Benefit

Workers will not have to work as hard as if they were in an office
It is easier to get all the workers together for meetings and briefings
It would be easier for managers to supervise workers
Not so much money would have to be spent on the company’s utility bills
There would be no distractions for workers preventing them from working
Lower costs as company can rent smaller offices
The workforce would probably be happier so there would be improved motivation
to work and increased productivity
It would be easier to sell steel
The cost to the company of the phone calls would be cheaper as home phone
charges are lower
More staff would be retained so money would not have to be spent on training
new staff
[4]

2 Tick the four statements which are benefits to the company of using staff to make phone sales
rather than advertising on a website.

Benefit

You can reach a larger audience by phone than by using a website

Running a website is cheaper than paying telephone operators


They can be sure all targeted customers are reached as not everybody will see
the website
Phone calls always result in a successful sale
They can contact customers whose internet speed is so slow they may not be
able to use the website
They will know accurately how many sales they have made

You cannot get immediate feedback from your potential customers

Customers would never buy steel using a website

Websites can have video and photographs


It is more personal so it might be easier to persuade customers to purchase
steel
[4]

© UCLES 2015 9713/11/M/J/15 [Turn over


4

3 Describe how a microprocessor makes use of the data from a temperature sensor to control a
central heating system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

4 Each sales person would need a PC and a monitor. They will need additional hardware and
software to allow them to work from home.

(a) Name, and describe the use of, three additional items of hardware. Each use must be different.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

(b) Name, and describe the use of, three items of software. Each use must be different.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9713/11/M/J/15


5

5 Ibrahim is considering introducing video conferencing to replace phone conferencing.


Describe the advantages and disadvantages of doing this.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/11/M/J/15 [Turn over


6

Scenario 2
Questions 6 and 7

A geography teacher wants to use computers to help students improve their learning and help with her
lesson preparation.

Computers will be used by other teachers in their teaching.

© UCLES 2015 9713/11/M/J/15


7

6 Describe the use of each of the following types of software that the geography teacher would use
to prepare materials for her lessons. Each use must be different.

Spreadsheet .....................................................................................................................................

..........................................................................................................................................................

Web browser ....................................................................................................................................

..........................................................................................................................................................

DTP ..................................................................................................................................................

..........................................................................................................................................................

Image editing ....................................................................................................................................

......................................................................................................................................................[4]

7 Discuss the benefits and drawbacks to teachers and students of using computers in lessons to aid
teaching and learning.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/11/M/J/15 [Turn over


8

Scenario 3
Questions 8, 9, 10, 11 and 12

RockICT has decided to combine its staff records. It currently has separate computerised personal and
payroll details of all its staff.

The payroll system runs using all the data on a weekly basis. Workers are paid according to how many
hours they work in a week. On the new system human resources staff will need to be able to access
records quickly.

Joanne, a systems analyst, has collected a large amount of information about the existing system. The
information will be analysed before the system is designed.

RockICT requires its workers to have a duty of fidelity. It also has to follow government data protection
rules when storing data about its workers.

RockICT has hired Arty, an art and design company to produce CD covers for the albums its musicians
produce.

© UCLES 2015 9713/11/M/J/15


9

8 (a) Give three items of information, not related to their pay, that will need to be stored on the
master file about each member of RockICT staff.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

(b) Label the components of the following systems flowchart to show how the master file is
updated.

................................
Old master file
................................

.......................................

.......................................

................................ ................................

................................ ................................

[4]

© UCLES 2015 9713/11/M/J/15 [Turn over


10

9 (a) Describe in detail two ways that Joanne will use a data flow diagram to identify suitable
hardware for the new system.

1 .................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe how Joanne will identify the user and system requirements for the new system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/11/M/J/15


11

10 (a) Describe what is meant by the indexed sequential method of storing data.
Give reasons why it would be suitable in this scenario.
Indicate which storage medium would be most appropriate to use.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Joanne will need to design the file structure of the new system.
Describe six steps involved in designing the file structure, without referring to the indexed
sequential method of storing data.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...................................................................................................................................................

5 .................................................................................................................................................

...................................................................................................................................................

6 .................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/11/M/J/15 [Turn over


12

11 (a) Explain what is meant by duty of fidelity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe four rules which would be included in data protection legislation.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...............................................................................................................................................[4]

(c) Apart from following data protection rules and having a duty of fidelity, explain the
responsibilities of the company and its workers with regard to the privacy of payroll data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/11/M/J/15


13

12 Arty use graphics software to change images that have been imported into the software.

(a) Name and describe two input devices which are used to import images for use in the CD
covers.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[4]

(b) Name and describe four features of the graphics software used when changing the images.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...............................................................................................................................................[4]

(c) Describe two sources of images which would accompany the software when bought.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[2]

(d) The printing of the CD covers is now computer controlled. Describe two effects this had on
the workers who used to be involved in the printing process.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/11/M/J/15


14

BLANK PAGE

© UCLES 2015 9713/11/M/J/15


15

BLANK PAGE

© UCLES 2015 9713/11/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/11/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/11 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

1 [4]

Workers will not have to work as hard as if they were in an office

It is easier to get all the workers together for meetings and briefings

It would be easier for managers to supervise workers

Not so much money would have to be spent on the company’s



utility bills

There would be no distractions for workers preventing them from


working

Lower costs as company can rent smaller offices 

The workforce would probably be happier so there would be



improved motivation to work and increased productivity

It would be easier to sell steel

The cost to the company of the phone calls would be cheaper as


home phone charges are lower

More staff would be retained so money wouldn’t have to be spent



on training new staff

2 [4]
You can reach a larger audience by phone than by using a website

Running a website is cheaper than paying telephone operators

They can be sure all targeted customers are reached as not



everybody will see the website

Phone calls always result in a successful sale

They can contact customers whose internet speed is so slow they



may not be able to use the website

They will know accurately how many sales they have made 

You cannot get immediate feedback from your potential customers

Customers would never buy steel using a website

Websites can have video and photographs

It is more personal so it might be easier to persuade customers to



purchase steel

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

3 Three from: [3]

Compares temperature from sensor to the pre-set value


If sensor temperature is higher/lower than pre-set value microprocessor sends a signal…
…to the actuator
If lower, microprocessor/actuator switches heater on
If higher, then microprocessor/actuator switches heater off

4 (a) Three from: [3]

A router/modem to connect to the internet


A fax machine to fax phone orders to main office
A landline phone to communicate with manager/main office/customers
A mobile phone in case landline phone is damaged
A printer to print orders to be faxed
Headset/touch phone to phone conference with the main office
Microphone/speakers/headset to communicate with customers

(b) Three from: [3]

Word processor to type up orders


Database software to edit customer details
CTI software to communicate with customers
Time management software to record hours of work
E-mail software to send messages to colleagues

5 Four from: [4]

Advantages
You can see the facial expressions/body language of other participants
You can see/amend/share documents that you want to discuss with each other
Easier to identify whose turn it is/who wants to contribute next
Once equipment is bought less expensive to run/set up/organise than a phone conference

Disadvantages
More expensive to buy hardware/software
If there are problems with internet connection, conference may be interrupted
More equipment needed so greater chance of problems

Max three for all advantages/disadvantages

6 Four from: [4]

Spreadsheet – prepare population statistics


Web browser – look up resources for worksheets/students to use
DTP – produce worksheets
Image editing software to edit maps

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

7 Six from: [6]

Benefits
ICT make lessons more interesting/entertaining
ICT make lessons more varied
Internet allows students to investigate ideas
Internet allows students to carry out research
Neatness of students work makes it easier for teacher to mark
ICT provides a more interactive learning environment
Teachers can spend less time with students with special needs because of ICT resources/
ICT resources can help students with special needs
Teachers have more varied teaching aids/can make use of multimedia in lessons
Teachers can use/produce computer based tests/can use ICT to assess students’
performance/students can assess own performance
Teachers can use spreadsheets/databases to record test scores/produce graphs of progress
Easier to compare class/students’ performance/track progress
Tests can be computer-marked saving teachers’ time
Easier to monitor student activities using monitoring software

Drawbacks
Takes a lot of time to prepare ICT materials
Can be difficult to ensure all students are on task if no monitoring software is available
More resources are available so students might make inefficient use of these
More difficult to co-ordinate activities
Plagiarism can cause teachers’ problems

Must have at least one of each to gain full marks

8 (a) Three from: [3]

Name
Contact details i.e. phone/address
Holiday entitlement
Job title
Employee number/ID number/payroll number/works number
Social security/national insurance number
Department worked in
Date employed
Date of birth

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

(b)

Transaction [1]
Old master
file file

Update [1]
process

[1]
Reports New
[1]
master
file

9 (a) Two sets of statements from: [4]

Look at the terminators and flow arrows in the DFD which show the volume of input data
…which leads to decisions on appropriate input devices

Look at the terminators and flow arrows out of the system which indicate the quantity/ format
of the output/required output…
…which leads to decisions on appropriate output devices

Look at the processes involved (in storing and analysing results)…


…the processing requirements will be known …
…which will give an idea about the size and speed of the processor required

Look at the stores in the DFD which will show how much data needs to be stored…
… the storage requirements will be known
….which is needed to identify the size and number of storage devices

(b) Four from: [4]

Using collected information/results of observation to see exactly what job each worker is
doing
Joanne will have interviewed payroll workers/manager to find their requirements
Will use the DFD to come to a conclusion about the user/system requirements
From user requirements she will produce a requirements specification…
…list of the features of the system that is required
Identify general requirements such as what the user wants the overall system to do
Identify specific requirements
Example of specific requirements
Results of examining documents will help identify required hardware/software
Results of observation will help identify required hardware/software

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

10 (a) Five from: [5]

Table of indexes is stored


The index will allow for direct access…
…needed when accessing individual worker records quickly
The records will be held sequentially to allow for serial access…
…used to process all records one after the other
Suitable because payroll will process all records one after the other

Magnetic/hard disk would be most suitable [1]

(b) Six from: [6]

Type of database is chosen (flat file/relational)


If it is going to be a relational database, number of tables is decided upon
A key field to identify each record is chosen
Relationships are designed/Entity Relationship Diagrams are designed
Appropriate field names are chosen…
…relating to data content of field and unique name
Field data type is selected such as text, number, Boolean, appropriate to field contents
Field lengths are chosen so that space/memory is not wasted, but leaves room for expansion
Validation rules are designed
Validation rules are chosen appropriate to field contents
Validation error message(s) designed
Field descriptions are included which adequately inform about field contents

11 (a) Two from: [2]

Employee must be loyal to their employer….


…for as long as they are employed by the company
Must not tell rival companies about their work
Employee is free to use skills and knowledge acquired from company after they leave them

(b) Four from, data must be: [4]

Kept secure
Fairly and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept longer than necessary
Processed in accordance with the individual’s rights
Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 11

(c) Four from: [4]

Payroll workers must not share any payroll data with anybody/outside the organisation/other
employees.
Payroll workers should sign a confidentiality agreement/have a duty of confidence
Information about an individual should not be passed to another organisation without
permission of the individual
Information should be anonymised where possible
Information should be aggregated where possible

12 (a) Two matched pairs from: [4]

Scanner
Used to import hard copy images/photographs

Digital camera
Used to download photographs stored on the camera

(b) Four from: [4]

Cropping – removing a portion of the image


Rotating – turning the image through an angle
Flipping – getting a mirror image
Filling – filling a shape with colour
Drawing of lines and shapes
Adding text in a variety of fonts

(c) Two from: [2]

Clip art library/gallery


Photograph library/gallery
Libraries of pre-prepared designs

(d) Two from: [2]

Increase in unemployment of print workers


Re-training of print workers
Change in working practices of print workers
Print workers‘ skills will no longer be required

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 3 9 1 1 8 0 5 8 6 4 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 May/June 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 13 printed pages and 3 blank pages.

DC (FD) 110076
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

XYA is a company in a developing country that buys and sells steel. They employ a number of sales
staff to phone potential customers in order to sell their steel.

They are seeking to save costs and have asked a number of their sales staff to work from home.
Temperatures are fairly low in the winter so sales staff tend to have central heating systems in their
homes.

Regular staff meetings are planned to take place using phone conferencing which the manager Ibrahim
will organise.

© UCLES 2015 9713/12/M/J/15


3

1 Tick the four statements which are benefits to the company of workers working from home.

Benefit

Workers will not have to work as hard as if they were in an office
It is easier to get all the workers together for meetings and briefings
It would be easier for managers to supervise workers
Not so much money would have to be spent on the company’s utility bills
There would be no distractions for workers preventing them from working
Lower costs as company can rent smaller offices
The workforce would probably be happier so there would be improved motivation
to work and increased productivity
It would be easier to sell steel
The cost to the company of the phone calls would be cheaper as home phone
charges are lower
More staff would be retained so money would not have to be spent on training
new staff
[4]

2 Tick the four statements which are benefits to the company of using staff to make phone sales
rather than advertising on a website.

Benefit

You can reach a larger audience by phone than by using a website

Running a website is cheaper than paying telephone operators


They can be sure all targeted customers are reached as not everybody will see
the website
Phone calls always result in a successful sale
They can contact customers whose internet speed is so slow they may not be
able to use the website
They will know accurately how many sales they have made

You cannot get immediate feedback from your potential customers

Customers would never buy steel using a website

Websites can have video and photographs


It is more personal so it might be easier to persuade customers to purchase
steel
[4]

© UCLES 2015 9713/12/M/J/15 [Turn over


4

3 Describe how a microprocessor makes use of the data from a temperature sensor to control a
central heating system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[3]

4 Each sales person would need a PC and a monitor. They will need additional hardware and
software to allow them to work from home.

(a) Name, and describe the use of, three additional items of hardware. Each use must be different.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

(b) Name, and describe the use of, three items of software. Each use must be different.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2015 9713/12/M/J/15


5

5 Ibrahim is considering introducing video conferencing to replace phone conferencing.


Describe the advantages and disadvantages of doing this.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/12/M/J/15 [Turn over


6

Scenario 2
Questions 6 and 7

A geography teacher wants to use computers to help students improve their learning and help with her
lesson preparation.

Computers will be used by other teachers in their teaching.

© UCLES 2015 9713/12/M/J/15


7

6 Describe the use of each of the following types of software that the geography teacher would use
to prepare materials for her lessons. Each use must be different.

Spreadsheet .....................................................................................................................................

..........................................................................................................................................................

Web browser ....................................................................................................................................

..........................................................................................................................................................

DTP ..................................................................................................................................................

..........................................................................................................................................................

Image editing ....................................................................................................................................

......................................................................................................................................................[4]

7 Discuss the benefits and drawbacks to teachers and students of using computers in lessons to aid
teaching and learning.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/12/M/J/15 [Turn over


8

Scenario 3
Questions 8, 9, 10, 11 and 12

RockICT has decided to combine its staff records. It currently has separate computerised personal and
payroll details of all its staff.

The payroll system runs using all the data on a weekly basis. Workers are paid according to how many
hours they work in a week. On the new system human resources staff will need to be able to access
records quickly.

Joanne, a systems analyst, has collected a large amount of information about the existing system. The
information will be analysed before the system is designed.

RockICT requires its workers to have a duty of fidelity. It also has to follow government data protection
rules when storing data about its workers.

RockICT has hired Arty, an art and design company to produce CD covers for the albums its musicians
produce.

© UCLES 2015 9713/12/M/J/15


9

8 (a) Give three items of information, not related to their pay, that will need to be stored on the
master file about each member of RockICT staff.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...............................................................................................................................................[3]

(b) Label the components of the following systems flowchart to show how the master file is
updated.

................................
Old master file
................................

.......................................

.......................................

................................ ................................

................................ ................................

[4]

© UCLES 2015 9713/12/M/J/15 [Turn over


10

9 (a) Describe in detail two ways that Joanne will use a data flow diagram to identify suitable
hardware for the new system.

1 .................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe how Joanne will identify the user and system requirements for the new system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/12/M/J/15


11

10 (a) Describe what is meant by the indexed sequential method of storing data.
Give reasons why it would be suitable in this scenario.
Indicate which storage medium would be most appropriate to use.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Joanne will need to design the file structure of the new system.
Describe six steps involved in designing the file structure, without referring to the indexed
sequential method of storing data.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...................................................................................................................................................

5 .................................................................................................................................................

...................................................................................................................................................

6 .................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/12/M/J/15 [Turn over


12

11 (a) Explain what is meant by duty of fidelity.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe four rules which would be included in data protection legislation.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...............................................................................................................................................[4]

(c) Apart from following data protection rules and having a duty of fidelity, explain the
responsibilities of the company and its workers with regard to the privacy of payroll data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/12/M/J/15


13

12 Arty use graphics software to change images that have been imported into the software.

(a) Name and describe two input devices which are used to import images for use in the CD
covers.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[4]

(b) Name and describe four features of the graphics software used when changing the images.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...................................................................................................................................................

3 .................................................................................................................................................

...................................................................................................................................................

4 .................................................................................................................................................

...............................................................................................................................................[4]

(c) Describe two sources of images which would accompany the software when bought.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[2]

(d) The printing of the CD covers is now computer controlled. Describe two effects this had on
the workers who used to be involved in the printing process.

1 .................................................................................................................................................

...................................................................................................................................................

2 .................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/12/M/J/15


14

BLANK PAGE

© UCLES 2015 9713/12/M/J/15


15

BLANK PAGE

© UCLES 2015 9713/12/M/J/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/12/M/J/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the May/June 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/12 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

1 [4]

Workers will not have to work as hard as if they were in an office

It is easier to get all the workers together for meetings and briefings

It would be easier for managers to supervise workers

Not so much money would have to be spent on the company’s



utility bills

There would be no distractions for workers preventing them from


working

Lower costs as company can rent smaller offices 

The workforce would probably be happier so there would be



improved motivation to work and increased productivity

It would be easier to sell steel

The cost to the company of the phone calls would be cheaper as


home phone charges are lower

More staff would be retained so money wouldn’t have to be spent



on training new staff

2 [4]
You can reach a larger audience by phone than by using a website

Running a website is cheaper than paying telephone operators

They can be sure all targeted customers are reached as not



everybody will see the website

Phone calls always result in a successful sale

They can contact customers whose internet speed is so slow they



may not be able to use the website

They will know accurately how many sales they have made 

You cannot get immediate feedback from your potential customers

Customers would never buy steel using a website

Websites can have video and photographs

It is more personal so it might be easier to persuade customers to



purchase steel

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

3 Three from: [3]

Compares temperature from sensor to the pre-set value


If sensor temperature is higher/lower than pre-set value microprocessor sends a signal…
…to the actuator
If lower, microprocessor/actuator switches heater on
If higher, then microprocessor/actuator switches heater off

4 (a) Three from: [3]

A router/modem to connect to the internet


A fax machine to fax phone orders to main office
A landline phone to communicate with manager/main office/customers
A mobile phone in case landline phone is damaged
A printer to print orders to be faxed
Headset/touch phone to phone conference with the main office
Microphone/speakers/headset to communicate with customers

(b) Three from: [3]

Word processor to type up orders


Database software to edit customer details
CTI software to communicate with customers
Time management software to record hours of work
E-mail software to send messages to colleagues

5 Four from: [4]

Advantages
You can see the facial expressions/body language of other participants
You can see/amend/share documents that you want to discuss with each other
Easier to identify whose turn it is/who wants to contribute next
Once equipment is bought less expensive to run/set up/organise than a phone conference

Disadvantages
More expensive to buy hardware/software
If there are problems with internet connection, conference may be interrupted
More equipment needed so greater chance of problems

Max three for all advantages/disadvantages

6 Four from: [4]

Spreadsheet – prepare population statistics


Web browser – look up resources for worksheets/students to use
DTP – produce worksheets
Image editing software to edit maps

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

7 Six from: [6]

Benefits
ICT make lessons more interesting/entertaining
ICT make lessons more varied
Internet allows students to investigate ideas
Internet allows students to carry out research
Neatness of students work makes it easier for teacher to mark
ICT provides a more interactive learning environment
Teachers can spend less time with students with special needs because of ICT resources/
ICT resources can help students with special needs
Teachers have more varied teaching aids/can make use of multimedia in lessons
Teachers can use/produce computer based tests/can use ICT to assess students’
performance/students can assess own performance
Teachers can use spreadsheets/databases to record test scores/produce graphs of progress
Easier to compare class/students’ performance/track progress
Tests can be computer-marked saving teachers’ time
Easier to monitor student activities using monitoring software

Drawbacks
Takes a lot of time to prepare ICT materials
Can be difficult to ensure all students are on task if no monitoring software is available
More resources are available so students might make inefficient use of these
More difficult to co-ordinate activities
Plagiarism can cause teachers’ problems

Must have at least one of each to gain full marks

8 (a) Three from: [3]

Name
Contact details i.e. phone/address
Holiday entitlement
Job title
Employee number/ID number/payroll number/works number
Social security/national insurance number
Department worked in
Date employed
Date of birth

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

(b)

Transaction [1]
Old master
file file

Update [1]
process

[1]
Reports New
[1]
master
file

9 (a) Two sets of statements from: [4]

Look at the terminators and flow arrows in the DFD which show the volume of input data…
…which leads to decisions on appropriate input devices

Look at the terminators and flow arrows out of the system which indicate the quantity/ format
of the output/required output…
…which leads to decisions on appropriate output devices

Look at the processes involved (in storing and analysing results)…


…the processing requirements will be known …
…which will give an idea about the size and speed of the processor required

Look at the stores in the DFD which will show how much data needs to be stored…
… the storage requirements will be known
….which is needed to identify the size and number of storage devices

(b) Four from: [4]

Using collected information/results of observation to see exactly what job each worker is
doing
Joanne will have interviewed payroll workers/manager to find their requirements
Will use the DFD to come to a conclusion about the user/system requirements
From user requirements she will produce a requirements specification…
…list of the features of the system that is required
Identify general requirements such as what the user wants the overall system to do
Identify specific requirements
Example of specific requirements
Results of examining documents will help identify required hardware/software
Results of observation will help identify required hardware/software

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

10 (a) Five from: [5]

Table of indexes is stored


The index will allow for direct access…
…needed when accessing individual worker records quickly
The records will be held sequentially to allow for serial access…
…used to process all records one after the other
Suitable because payroll will process all records one after the other

Magnetic/hard disk would be most suitable [1]

(b) Six from: [6]

Type of database is chosen (flat file/relational)


If it is going to be a relational database, number of tables is decided upon
A key field to identify each record is chosen
Relationships are designed/Entity Relationship Diagrams are designed
Appropriate field names are chosen…
…relating to data content of field and unique name
Field data type is selected such as text, number, Boolean, appropriate to field contents
Field lengths are chosen so that space/memory is not wasted, but leaves room for expansion
Validation rules are designed
Validation rules are chosen appropriate to field contents
Validation error message(s) designed
Field descriptions are included which adequately inform about field contents

11 (a) Two from: [2]

Employee must be loyal to their employer….


…for as long as they are employed by the company
Must not tell rival companies about their work
Employee is free to use skills and knowledge acquired from company after they leave them

(b) Four from, data must be: [4]

Kept secure
Fairly and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept longer than necessary
Processed in accordance with the individual’s rights
Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2015 9713 12

(c) Four from: [4]

Payroll workers must not share any payroll data with anybody/outside the organisation/other
employees.
Payroll workers should sign a confidentiality agreement/have a duty of confidence
Information about an individual should not be passed to another organisation without
permission of the individual
Information should be anonymised where possible
Information should be aggregated where possible

12 (a) Two matched pairs from: [4]

Scanner
Used to import hard copy images/photographs

Digital camera
Used to download photographs stored on the camera

(b) Four from: [4]

Cropping – removing a portion of the image


Rotating – turning the image through an angle
Flipping – getting a mirror image
Filling – filling a shape with colour
Drawing of lines and shapes
Adding text in a variety of fonts

(c) Two from: [2]

Clip art library/gallery


Photograph library/gallery
Libraries of pre-prepared designs

(d) Two from: [2]

Increase in unemployment of print workers


Re-training of print workers
Change in working practices of print workers
Print workers‘ skills will no longer be required

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 3 9 7 5 6 0 5 1 3 8 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 October/November 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (SLM) 113354/1
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5.

A regional government agency is responsible for encouraging citizens to use ICT to access government
information and services online.

The agency is also responsible for trying to reduce the ‘digital divide’ so that citizens can use online
services and facilities provided by banks and retailers.

The agency is concerned about the antisocial use of ICT and about computer fraud. It wishes to
commission a survey to be completed by citizens to reveal the extent of these problems.

© UCLES 2015 9713/32/O/N/15


3

1 Describe the services that could be provided on the government website.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15 [Turn over


4

2 Discuss the benefits and drawbacks of the government putting its information and services online.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15


5

3 Explain how the regional government could try to reduce the ‘digital divide’ so that more citizens
would be able to access its online services.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/32/O/N/15 [Turn over


6

4 Describe four examples of antisocial use of ICT and for each one describe how it might be
prevented. Each method of prevention must be different.

Example 1 .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Example 2 .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Example 3 .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Example 4 .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention .........................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15


7

5 Explain how using banking and shopping services online by citizens can lead to fraud.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/32/O/N/15 [Turn over


8

Scenario 2
Questions 6, 7, and 8.

RockICT plc is a store that sells goods online. Customers are required to have an online account for
use when purchasing goods.

Peter wants to purchase goods online from the store and uses a web browser to locate and access the
store’s secure website.

When purchasing goods using the store’s website, Peter adds the goods to a virtual shopping cart and
pays for the goods online by clicking the ‘buy now’ button shown on the cart webpage.

The purchased goods can be kept in the store for Peter to collect, sent to Peter using the postal service
or delivered by the store’s own delivery vehicles.

© UCLES 2015 9713/32/O/N/15


9

6 Describe features of the store’s website that would enable and encourage Peter to browse and
choose goods to add to his virtual shopping cart.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2015 9713/32/O/N/15 [Turn over


10

7 Describe, in detail, the processing that occurs when Peter clicks on the ‘buy now’ button of his
virtual shopping cart.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15


11

8 Explain how a secure website helps to keep Peter’s payment details from being viewed by
unauthorised persons while being transmitted to and from the store’s website.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15 [Turn over


12

Scenario 3
Questions 9, 10 and 11.

An international company has offices in different cities around the world.

Each of the offices has its own local area network (LAN) that uses dedicated cabling and wireless
connections.

The company has an intranet which can be accessed remotely.

The office LANs are connected together using the internet to create a company wide area network
(WAN).

© UCLES 2015 9713/32/O/N/15


13

9 The company uses the following on its network. Describe the role of each:

(i) proxy server

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(ii) firewall

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(iii) file server

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/32/O/N/15 [Turn over


14

(iv) wireless access point

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

10 Compare and contrast an intranet with an extranet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/32/O/N/15


15

11 Explain the reasons why both wireless and dedicated cabling are used for the company LANs.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2015 9713/32/O/N/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/32/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/32 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

1 Eight from e.g.:

Electoral services enabling online voting by citizens


Electoral services enabling the compilation of an electoral register by the government agency
Taxation services to enable the viewing of tax records
Taxation services to enable citizens to pay taxes
To enable applications for official documents/passports/driving licences/identification papers by
citizens
Health services to provide news/advice on health issues to citizens
Health services to enable self-diagnosis by citizens
Health services to find locations of doctors/hospitals
Education services to provide details of schools/colleges/courses
Education services to provide online applications for courses
Recruiting for government positions [8]

2 Eight from:

Benefits:
Saves the cost of printing paper-based information
Reduced staffing costs/office requirement as fewer staff needed
Information can be updated easily/kept up-to-date
Increased access to government information
Information can be personalised
Faster access by citizens to government information/news
Government perceived to be more ‘open’

Drawbacks:
Personal contact with government officials can be lost
Not all citizens have access to internet/computers/ICT skills
Concern over use of (personal) data by government

Max 6 for all benefits or all drawbacks.


One mark available for a reasoned conclusion [8]

3 Four from e.g.:

Expand/provide the telecommunications infrastructure for access to internet in all areas


Provide low-cost/subsidise cost of ICT systems/computers for citizens
Provision of trainers in ICT for citizens
Provision of courses in use of ICT
Provide written manuals/help documents
Create forums for mutual help/self-help [4]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

4 Eight from e.g.:

One mark for each example, one mark for prevention, max 8 marks.

Example Prevention

Cyber bullying – attacking/victimising others One from:


online • Education/informing young people of
consequences/unacceptability
• Encouraging young people to report
incidences

Deliberate sending of malware – distribution Ensure that anti-malware software is up-to-


of e.g. a virus date/in use

Grooming – making contact/friends with intent One from:


to abuse • Encouraging young people to report
incidences
• Monitoring web activity of young people

Misuse of personal data Ensuring that personal data is kept secure

Pharming – redirection of web traffic to fake One from:


site • Education/informing people of risks
• reporting incidences

Phishing – asking for personal/financial details One from:


• not opening emails from unknown senders
• filtering of emails into appropriate
folders/rejecting emails
• not responding to emails that look
suspicious/are from unknown senders

Spam - unsolicited commercial advertisements One from:


received/sent online • Use of spam filters
• Use of different email addresses
specifically for particular sites

Unauthorised access to a system One from:


• Use of firewalls
• Use of encryption of passwords etc. so not
easily read if intercepted
• use of obscure passwords/complex
passwords
• change passwords regularly
• limiting of access rights to authorised
persons

Uses of ICT devices to e.g. play loud • block/remove device


music/annoy people on trains

[8]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

5 Six from e.g.:

Personal details can be intercepted during transfer between user and bank/shopping site
Personal details can be used for identity theft
User IDs/passwords can be stolen by cyber attackers/hackers and used for fraudulent activities
Financial details can be intercepted during transfer between user and bank/shopping site
Financial details can be used to purchase goods by third parties
Financial details can be used to transfer/steal funds from bank accounts of users
…money taken from bank accounts without authorisation
Possibility of pharming – using a fake web site
…goods never arrive
Receipt of phishing emails/calls from third person purporting to be from bank/online seller asking
for personal/financial details
…use of these details by third person to commit fraud
fraudulent claims by purchaser against seller/bank
…falsely claiming non-delivery of goods
…return of goods for false reasons after using them e.g. wear once of garments (e.g. event such
as wedding) then return for refund of cost
use of stolen credit cards/credit card details
…to commit fraud by purchasing goods/services [6]

6 Six from e.g.:

Search engine to allow queries/complex searches to find suitable goods


Categories of goods/grouping of similar goods together to facilitate making a choice/finding
suitable goods
Use of images/video/animation to illustrate goods to encourage purchase
Use of links to other goods to draw attention to associated goods
Use of links to goods purchased by others to suggest purchases
Provision of wish list store goods that might be purchased later
Use of cookies to suggest additional purchases based on current purchases
Provision of customer reviews of goods viewed/found by searches [6]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

7 Eight from:

Virtual shopping cart adds costs of goods and delivery charges to produce total cost
Virtual shopping cart submits order to website/company payment gateway
Need to supply login details/access user account to ‘proceed to checkout’
Update of stock levels on stock control system
Payment gateway forwards request/details to buyer’s credit card company
…using encrypted data for transmission
Credit card company checks the card/account number exists
Credit card company checks for sufficient funds/credit
Credit card company checks if card/account is blocked/stolen/frozen
…authorises the payment if valid
Payment gateway tells virtual shopping cart that payment has been authorised/is successful
Payment gateway starts transfer of funds from buyer credit card account to website/shop account
Payment made and transaction finalised
Confirmation of/input of delivery details
Confirmation sent to buyer/Peter via email
Order tracking process is initiated so Peter can follow the progress of the order [8]

8 Eight from:

Use of Hyper Text Transfer Protocol Secure (https)


…a padlock icon is displayed to show that a secure connection has been established/URL
changes colour
…to encrypt the exchange using a digital (SSL) certificate
…digital (SSL) certificate contains user’s public key/uses two-key encryption/private and public
keys
Uses Secure Socket Layer (SSL)
…digital (SSL) certificate exchanged
…digital (SSL) certificate contains encryption code/client browser’s ‘public’ key
…public key used to encrypt data for transmission by server to client browser
…client browser used ‘private’ key to un-encrypt data for display
…private key not shared with anyone
Encrypted data can be intercepted
…but cannot be read/unscrambled without encryption/private key
Process/procedure called Public Key Infrastructure [8]

9 (i) Four from:

Acts as buffer between LAN and internet/WAN


Store frequently used websites/pages
…to facilitate faster access
…from internal network/LAN
…pages updated at intervals
Network Address Translation
…to obscure/hide internal LAN addresses
…to increase number of available network addresses for access to internet
Can be used to filter out/block out unwanted/inappropriate websites [4]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

(ii) Three from:

Connected/situated between LAN and internet


…acts as gateway from/to LAN
Used to control access to/from LAN
…to keep data secure/safe from unauthorised computer/access
Used to inspect packets/data leaving/entering LAN from outside/internet/WAN
…checks list of key words/URL
…allows authorised data/packets through
…drops/refuses access to unauthorised data/packets [3]

(iii) Two from:

Stores company files/data


…company documents/templates
…for access via network/LAN
…by company employees [2]

(iv) Three from:

Allows remote login/connection to network


…via Wi-Fi
…by mobile devices e.g. laptops/smartphones
…allows/facilitates guest login
Obviates need for additional wiring
…when extending network/adding computers [3]

10 Four from e.g.:

Intranet uses IP protocols to share resources within a company


Intranet may make use of dedicated server to provide access to web-based resources
Extranet extends intranet by allowing remote access to intranet
Employees can connect to intranet by VPN to connect over public communication networks
Extranet can allow (parts of) intranet to be used by non-employees (via VPN) to connect over
public communication networks. [4]

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 32

11 Eight from e.g.:

Both cables and wireless are used because:

(Dedicated) cables:

Can reach areas that wireless cannot penetrate


…wireless will not pass through (some) obstacles/walls/materials
Provide higher bandwidth than wireless connection
…greater data throughput available for intensive computer-based tasks e.g.
database/intranet/CAD/CAM
Are more secure
…more difficult to eavesdrop/hack into (cables) are more reliable
…provide a constant download/upload speed/bandwidth
Are easy to use/install
…no need for configuration/security codes
Have a greater range
…single cable can reach further than wireless/can use switch/hub to extend distance easily

Wireless:

Provides easier to add devices when extra staff or nodes required in offices
…no need to install extra cabling
…extra cabling can be more expensive
Provides access where the structure of the building is not suitable for cabling
…materials may be difficult to penetrate for cables e.g. stone/steel
…restrictions on alterations/additions to building because it is old/protected
Allows mobility of devices
…devices are not fixed or tethered by cables
…offices can be re-arranged with the need for physical connections to be moved
Allows flexibility
…devices can be positioned wherever there is a signal
Can provide guest logins
…can provide logins for guests/visitors with no need for physical connection

Max 4 for all (dedicated) cables or all wireless. [8]

[Total: 80]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 9 9 1 8 0 7 9 0 5 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 October/November 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (LM) 116413
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3 and 4.

Global Scientific is a company that manufactures industrial chemicals in a large factory.


The company employs scientists to monitor the environmental conditions to ensure that the factory and
the surrounding areas are kept safe from pollution from the industrial chemicals.

The scientists collect data manually by going into the factory and out into the surrounding areas where
they use laptops to record the data that they collect.

The scientists also use sensors connected to their office computers to collect data.

The data from the manual collection and from the sensors is sent to head office to be analysed and
used in weekly reports.

© UCLES 2015 9713/33/O/N/15


3

1 Describe how data logging could be used to monitor the environmental conditions around the
factory.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

2 Describe how the functions available in a spreadsheet could be used to analyse the collected
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/33/O/N/15 [Turn over


4

3 Discuss the benefits and drawbacks of monitoring the environmental conditions in and around the
factory by using a computer system rather than manual monitoring.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9713/33/O/N/15


5

4 Describe how FTP could be used to transfer the data files between the computers at the factory
and the head office.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 9713/33/O/N/15 [Turn over


6

Scenario 2
Questions 5, 6 and 7.

NoRisk Bank plc holds the financial details of a large number of personal and commercial account
holders. The bank allows account holders to manage their accounts online.

Gupta is a network administrator responsible for the safety and security of the data held by NoRisk
Bank plc.

Gupta uses a number of different methods to try and keep the data associated with the accounts
safe and secure. When logging in, the bank’s computer system requires account users to undergo
authentication.

Gupta also uses a range of anti-malware software to try to prevent the corruption and theft of the data.

© UCLES 2015 9713/33/O/N/15


7

5 (a) State what is meant by ‘authentication’.

...................................................................................................................................................

.............................................................................................................................................. [1]

(b) Passwords are a method of authentication. Describe two other methods of authentication
that could be used when account holders log into an account.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

6 (a) Describe how a firewall can help to keep the account data secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/33/O/N/15 [Turn over


8

(b) Describe the drawbacks of using each of the following methods of keeping data secure.

(i) Security guards .................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Encryption .........................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2015 9713/33/O/N/15


9

7 Describe how Gupta would use each of the following anti-malware applications to keep data safe
and secure.

Anti-virus software ............................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Anti-spyware software ......................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Anti-popup software .........................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 9713/33/O/N/15 [Turn over


10

Scenario 3
Questions 8, 9, 10 and 11.

Global Systems is an international company with one head office and a number of other offices around
the world. It has a business network that uses wired and wireless methods of data transmission. The
wireless network requires a security key for access.

The network is used for transferring data around the network from computer to computer, to and from
servers and for sharing peripherals such as scanners and printers.

The business network also allows users to communicate with each other and has internet access to
allow communications between users in different offices and with others around the world.

The business network consists of local area networks (LANs) in the head office which are connected
into a wide area network (WAN) with the LANs in other offices using public telecommunications
systems.

© UCLES 2015 9713/33/O/N/15


11

8 Describe how spread spectrum transmission is used in wireless networking.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

9 Explain two reasons why infrared is not often used for wireless networking.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]
© UCLES 2015 9713/33/O/N/15 [Turn over
12

10 Explain why wired equivalent privacy (WEP) should no longer be used to secure wireless networks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/33/O/N/15


13

11 Discuss the benefits and drawbacks of connecting the individual LANs into a WAN.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9713/33/O/N/15 [Turn over


14

Scenario 4
Questions 12 and 13.

Speedy Dropoff Co owns a number of trucks that it uses to deliver parcels in a large city. It keeps the
trucks in a parking garage just outside the city.

The company also has a maintenance garage where servicing of the trucks, repairs and diagnosing of
engine faults is carried out. Engine fault diagnosis is carried out using an expert system.

Rowena is the delivery manager of the company and uses route scheduling software to work out the
shortest route that each truck should take to make its deliveries. She also wants the trucks to take the
most economical routes.

© UCLES 2015 9713/33/O/N/15


15

12 (a) Explain, with detailed descriptions of the components, what is meant by an “expert system”.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Describe, apart from car fault diagnosis and route scheduling, two other uses of expert
systems.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]
© UCLES 2015 9713/33/O/N/15 [Turn over
16

13 (a) State four inputs to the route scheduling software so that it can work out the shortest route for
a delivery truck.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe one other input that must be entered so that the route scheduling software can work
out the most economical route.

...................................................................................................................................................

.............................................................................................................................................. [1]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/33/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/33 Paper 3 (Written B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 33

1 Six from e.g.:

data logging can be left unattended for periods of time


…automatic logging of data
…can be continuous or at intervals
…can be set up to start sometime in future
…to monitor e.g. temperature/relative humidity/solar radiation/soil moisture
(use of sensors to collect the data) about the conditions in air, soil, water
recording of amounts/quantity of e.g. oxygen, carbon dioxide, NOx, SO2
ADC may have to be used to convert data from analogue to digital format
software in data logging device acquires the data from the sensors
data logger stores data in digital format/suitable for import to spreadsheet/database
data logger stores data for a period of time
…sends data in batch
…sends data on request to a computer for processing
data logging software analyses data ready for presenting data in appropriate
format/tables/graphs/charts
data can be immediately sent from data logger and presented in real time on monitors/as
hardcopy/generate alert/alarm if readings outside set parameters [6]

2 Four descriptions from e.g.:

MIN to indicate the minimum level of e.g. O2 recorded


MAX to indicate the maximum level of e.g. O2 recorded
AVERAGE of the collected values
Nested IF to find where e.g. high O2 and low CO2 occur
COUNTIF to count number of e.g. days when e.g. O2 is below a safe level
COUNT the number of days that readings have been taken [4]

3 Eight from e.g.:

Benefits:
data is continually monitored by computers
…if event happens it is not missed
more accurate collection of data by sensors/computers
can monitor multiple sensors simultaneously
logged data is already in electronic form so no transcription errors/does not need to be entered
personnel are not needed to take the measurements so they can do other useful tasks
data can be displayed immediately/in real time
data can be analysed immediately/in real time

Drawbacks:
interruptions to power supply could cause collection of data to be missed/not happen
damage/failure of equipment could cause collection of data to be missed/not happen/be
inaccurate
maintenance of equipment can be expensive/time consuming/requires expertise/training

Max 6 for all benefits or all drawbacks [8]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 33

4 Six from:

use of FTP client on warehouse computers and FTP server at head office
…uses FTP protocol
…can be secured with use of SSL/TLS/SSH
FTP address of server is entered e.g. ftp.cie.org.uk
…or use of IP address of server
user name and password required
…anonymous connections (no user name and password required) may be allowed for downloads
but not for uploads/private FTP servers
use of port 21 to send commands to server from client (communications port)
…port is a ‘logical connection point’ for transferring data
use of a different port (the data port) for transfer of data
…both communications port and data port must be open/connect for data to be transferred
active mode
…client opens port and server connects to it
…most servers use port 20 as data port
passive mode
…server opens port and clients connects to it
firewalls must be set to allow FTP/ports that FTP uses [6]

5 (a) Proving who you are to the computer system [1]

(b) Two methods from e.g.:

biometrics
…valid example of use
digital certificates
…unique to user
transaction authentication number
…entered and verified against list issued and held by bank
…TAN only recognised/used once
multi-factor authentication
…two or more factors
…knowledge factor (something known only to user)
…possession factor (something only user has)
…inherence factor (something only user is) [4]

6 (a) Four from:

IP packets are interrogated/inspected by firewall


…source/destination address are checked
…data content checked for key words
…port checked to determine application that sent packet
…against a set of criteria/rules determined by user/system (network) administrator
firewall accepts/drops IP packets
…do not usually deny access to packets due to use of bandwidth to send it back
firewall alerts/reports to user
…about activity e.g. attempts to get access
…regular activity in/out network [4]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 33

(b) (i) Two from e.g.:

guards cannot watch every aspect


guards do not monitor areas continually
guards can be forgetful
guards can be dishonest [2]

(ii) Two from:

requires more computer processing power to create file


file creation can be slow
if key is lost then data cannot be retrieved
files are larger than unencrypted files
criminals can use encryption to hide evidence
hackers can encrypt files and demand money to unencrypt the file [2]

7 Anti-virus software:

Two from:
install/run in background on computer
regularly update
scan all files regularly
scan incoming files
monitor ports on computer
remove/quarantine viruses

Anti-spyware software:

Two from:
install/run in background on computer
regularly update
scan computer regularly
helps to prevent key-logging

Anti-popup software:

Two from:
install/run in background on computer
regularly update
use to remove popup code [6]

8 Six from:

use of radio waves


use of random frequency switching
…to increase security of data
random number generators
…choose random frequencies within band
…transmission switches frequencies
receiver and transmitter use same random numbers
…to stay synchronised [6]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 33

9 Two reasons from e.g.:

must be in line of sight/unobstructed


…so limited range
will not penetrate walls/obstacles
…so devices have to be in same room
low frequency
…cannot carry large amount of data [4]

10 Four from:

same traffic key cannot be used twice


…as limited number of keys
small amount of traffic can lead to key being recovered
…so encryption can be broken
single shared key between a number of users
…compromises security [4]

11 Eight from e.g.:

Benefits:
data/files can be stored on central fileserver
can share files/data over a large area/between LANs
can share peripherals/storage between LANs
can send messages/email quickly between users on different LANs
allows employees to work from home on corporate WAN
central backups can be set up

Drawbacks:
can be expensive/complex to set up
can be expensive and complex to maintain requiring expertise/skilled technicians
larger networks are easier to compromise/security is of greater importance
use of peripherals e.g. printers can be slow due to queues of jobs
failure of servers can affect all users/workstations
malware can spread more easily between workstations

Max 6 for all benefits/drawbacks


One mark is available for a reasoned conclusion [8]

12 (a) Six from:

computer-based system
using wide range of human knowledge
to help solve problems
uses knowledge base consists of a database of facts and the rules base
inference engine to find appropriate solutions
rules base consists of IF THEN statements
user interface to input questions/output possible solutions
knowledge base editor to edit rules and facts in in knowledge base [6]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 33

(b) Two from:

medical diagnosis
…to help doctors diagnosis patient illness
identification systems
…to help identify plants
…stone tools in archaeology
…structure of chemicals
tax/financial planning/advice
…calculating e.g. tax liabilities
insurance planning
…designing insurance packages for individuals/groups
…investment analysis
mineral prospecting
…probabilities of finding minerals/oil
automatic pilots in aircraft
…maintain flight/perform pre-set manoeuvres
…aid to human pilots [4]

13 (a) Four from:

number of drop points


distance between each drop off point
location of drop off points
known road works/obstructions
type/speed of vehicle
time available
layout of map [4]

(b) One from e.g.:

price of fuel
fuel consumption
number of hills on the route
known traffic black spots that might delay/slow journey times [1]

[Total: 80]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 8 4 1 3 4 3 6 0 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 October/November 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (NF) 101509/4
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3 and 4

The Queen Elizabeth Hospital uses computers to help run its intensive care unit. Nurses are still
required to take some readings relating to the condition of the patients. The computer will alert a nurse
if readings reach dangerous levels.

The hospital also uses computers to store and retrieve confidential records of all patients. This database
needs to be accessed at any time of day. When data is analysed for the purpose of producing statistics
it is usually in summarised form to protect patient confidentiality.

© UCLES 2015 9713/11/O/N/15


3

1 Tick the four advantages of using computers in intensive care.

Advantage

Computers can monitor patients continuously.

Nurses never get tired and never forget to take readings.

Readings taken by nurses are more accurate than computers.

Computers can measure more than one variable at any one time.

When nurses take readings charts are produced automatically.

Nurses are faster than computers to react to changes in a patient’s condition.


A computer can monitor the condition of several patients at the same time
leaving nurses free to do other tasks.
Computers do not cost any money.

A computer can only monitor one condition at a time.


The use of computers to take readings reduces the chances of nurses being
exposed to contagious diseases.
[4]

2 Tick the four statements referring to the use of computers in intensive care which are true.

Advantage

Sensors store the pre-set value.

Sensors feed back data to the computer.


If the patient’s blood pressure is too high the sensor sends the reading to the
computer.
The sensor readings are converted from digital to analogue so the computer can
process them.
The computer compares any data fed back by a sensor to a pre-set value.

The computer is unable to produce charts showing the patient’s progress.


Sensors are used to monitor a patient’s physical variables such as blood
pressure, pulse rate and body temperature.
The computer cannot take readings without the nurse supervising it.

If any data is outside the pre-set range the computer sounds an alarm.

The process is not continuous.

[4]
© UCLES 2015 9713/11/O/N/15 [Turn over
4

3 Explain why batch processing would not be used to warn the nurses about a patient’s condition
worsening.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

4 Name and describe two methods by which patient information could be summarised to help keep
patient data confidential.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/11/O/N/15


5

Scenario 2
Questions 5 and 6

Paula Richards is employed by a company to visit and inspect its stores. She spends most of her
time travelling.

Paula produces her reports using her laptop computer. She also has a smartphone which she
uses for other aspects of her work.

Some of the stores she visits are quite large and the management teams have equipment which
allows them to video conference with Paula when she returns to head office to discuss her report.

© UCLES 2015 9713/11/O/N/15 [Turn over


6

5 Using aspects of the scenario, describe four different uses she could make of her smartphone to
help her in her work.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..................................................................................................................................................... [4]

6 Describe five steps involved in setting up a video conference.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..........................................................................................................................................................

5 ......................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2015 9713/11/O/N/15


7

Scenario 3
Questions 7, 8, 9, 10 and 11

First Call Fashions is a very large mail order catalogue company which sells a variety of clothes in the
UK. Stella, the owner, has decided to computerise the company operations. She has employed Rafael,
a systems analyst, to supervise the process.

Rafael will analyse the current system. He will need to establish the inputs and outputs of the system.

As part of the design stage he will need to design a screen input form to input the details of all the
clothes.

He will need to produce user documentation for the system. User documentation often gives guidance
on how to use the system such as:

• How to load software / run software / install software


• How to save a file
• How to search
• How to sort
• How to print
• How to add records
• How to delete/edit records

When the system is fully developed he will need to evaluate it.

Stella is going to open a call centre so that customers can phone in for help with their orders. She is
considering whether to open it in the UK or overseas.

© UCLES 2015 9713/11/O/N/15 [Turn over


8

7 Rafael wants to establish the inputs and outputs of the current system.
Describe three items he will identify as a result of examining documents.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2015 9713/11/O/N/15


9

8 (a) Apart from navigation aids, describe five features of a well-designed screen-based data input
form.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

.............................................................................................................................................. [5]

(b) Describe four advantages of using a screen form rather than a paper-based form to collect
the data.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/11/O/N/15 [Turn over


10

9 (a) Apart from those uses listed in the scenario, describe four other items which would be
contained in the user documentation, including the reason for their inclusion.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe three drawbacks of Rafael not providing technical documentation.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/11/O/N/15


11

10 Describe in detail, three methods of obtaining feedback from users of the new system and for
each one give a different drawback of the method.

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 1 ......................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 2 ......................................................................................................................................

..........................................................................................................................................................

Method 3 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 3 ......................................................................................................................................

..................................................................................................................................................... [6]

11 (a) Give three advantages of using overseas call centres from the company’s point of view.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

(b) Give three advantages of using UK call centres from the point of view of the customer.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/11/O/N/15 [Turn over


12

Scenario 4
Question 12

Joan is a manager of a department in an examination board. She wants to introduce a multimedia ICT
qualification. Eventually, she will send multimedia files by emails to the schools taking the qualification.

She also uses the internet to search for resource materials for the qualification but sometimes cannot
obtain the required information.

© UCLES 2015 9713/11/O/N/15


13

12 (a) Describe what Joan has to do to prepare an email in order to send a very large attachment.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) A school receives the email but cannot open the attachment.
Give four reasons why this may happen.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(c) Describe, including the use of Boolean operands, five different ways Joan could better target
her searches when using the internet.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2015 9713/11/O/N/15 [Turn over


14

Scenario 5
Question 13

Hightown Bank, New York, operates an online banking system. A number of customers are concerned
about the security of their accounts.

© UCLES 2015 9713/11/O/N/15


15

13 (a) Identify the security risks which are described below:

Legitimate-looking emails sent out to customers pretending to be


from a bank; when the link in the email is clicked, the customer is
sent to a fake website. ..................................

Malicious code put into a user’s computer or server. When the


user selects the website they are sent to a fake website instead
without their knowledge. ..................................

Software on a user’s computer that monitors all key presses. ..................................

Illegal access to a computer where data can be deleted, changed


or used for malicious purposes. ..................................

Software that can replicate itself. Once installed on the computer,


it can cause it to operate slowly or delete or corrupt files. ..................................

Small file installed on a user’s computer after visiting a website.


This allows user preferences to be remembered each time they
visit the website. .................................. [6]

(b) This message is sent from a computer “ICT affects all aspects of our lives”.
It is converted so that when it arrives at another computer it is seen as “RXG zuuvxgh zoo
zhkvxgh lu lfi orevh”.

(i) State the name given to this process of conversion.

...................................................................................................................................... [1]

(ii) Describe how it is used as a form of security.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2015 9713/11/O/N/15 [Turn over


16

(c) Describe, in detail, four other safeguards that the bank could use to protect customer account
information.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/11/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/11 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 11

1
Computers can monitor patients continuously. 

Nurses never get tired and never forget to take readings.

Readings taken by nurses are more accurate than computers.

Computers can measure more than one variable at any one time. 

When nurses take readings charts are produced automatically.

Nurses are faster than computers to react to changes in a patient’s


condition.

A computer can monitor the condition of several patients at the same time

leaving nurses free to do other tasks.

Computers do not cost any money.

A computer can only monitor one condition at a time.

The use of computers to take readings reduces the chances of nurses being

exposed to contagious diseases.
[4]

2
Sensors store the pre-set value.

Sensors feed back data to the computer. 

If the patient’s blood pressure is too high the sensor sends the reading to
the computer.

The sensor readings are converted from digital to analogue so the computer
can process them.

The computer compares any data fed back by a sensor to a pre-set value. 

The computer is unable to produce charts showing the patient’s progress.

Sensors are used to monitor a patient’s physical variables such as blood



pressure, pulse rate and body temperature.

The computer cannot take readings without the nurse supervising it.

If any data is outside the pre-set range the computer sounds an alarm. 

The process is not continuous.


[4]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 11

3 Three from:

Batch processing is the processing of transactions/data in sequence but monitoring is real time
Data is collected in batches and then run altogether but data needs to be collected continuously
Batch processing is only suitable for applications where results of processing is not time critical
but monitoring is time critical
Warning to nurses would have to be given without any delay [3]

4 Anonymising information [1]


Individual records are summarised without mentioning the person by name [1]

Aggregating information [1]


Personal details of individuals are combined to provide summarised
information without naming those individuals. [1]

5 Four from:

Organise appointments with stores


Send emails to stores/company
Store contact details of store managers
Send/receive texts to keep in contact with the office/manager
Phone to contact stores/management teams/head office
Take photos of stores/management teams [4]

6 Five from:

Agree a date and time


Send a reminder shortly before start
…including access to password/PIN
Ensure webcam, microphone, speakers are ready
Carry out tests on microphone and speakers/headphones
Adjust webcam so participants can be seen
Log on to the system/internet
Ensure video conferencing software/internet connection is running properly/installed
Create room(s)/environment
Enter virtual room [5]

7 Three from:

Identify the sources of input data


Identify the volume of input data
Identify the data collection methods
Identify the input documents currently in use
Identify the output documents currently in use
Identify the computer procedures necessary to achieve the current output [3]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 11

8 (a) Five from:

Drop down menus


Submit/Save button
Exit button
Adequate space for field contents
Fonts/font size should be easy to read
Instructions how to complete form/help button
Clearly labelled field names
Fields spaced out/group relevant fields together
Sensible colour scheme
Use of tick boxes/radio buttons [5]

(b) Four from:

Easier to correct
Easier to duplicate data when records contain the same data
Easier to move to a particular record for editing purposes
Easier to read/clearer data in free text fields
Built in validation rules to prevent missing data in fields/making sure data is
reasonable/prevent errors [4]

9 (a) Four from:

The purpose of the system to give an overall description of what the system does
The input and output formats, so that you know how to enter data and know what the output
will look like
The hardware and software needed to run the system so that the user doesn’t use the wrong
hardware/software
Examples of sample runs of the system so that the user can tell if they are using the system
in the correct way.
Troubleshooting guide/a list of Frequently Asked Questions to know what to do when errors
occur [4]

(b) Three from:

The systems analyst would not have a detailed overview of the whole system
It would be difficult for programmers/systems analyst to amend the system to eliminate errors
Programmers would have difficulty fully understanding the program code that has been used
It would be difficult to develop further the system or upgrade it [3]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 11

10 Method: Could observe users performing set tasks and record their progress using video
recording/get an user to perform a task and measure the time it takes them to carry out the task
[1]
Drawback: Description of the Hawthorne effect [1]

Method: Interview users to gather their responses about what they thought of the system and
how easy it was to use [1]

Drawback: Users have to be available at the time the analyst wants to interview them/time
consuming as it may take a long time to interview all the users/may get answers which the user
thinks the analyst wants to hear [1]

Method: Hand out questionnaires to users to ask them about their thoughts on the new system
with regard to how easy they found it to use [1]

Drawback: They may give answers which are exaggerated as they are anonymous/questions
cannot be changed once they are typed up/follow up questions cannot be asked [1]

11 (a) Three from:

Phone operators will be paid less


Buildings needed to house call centres will be cheaper to buy/rent
Call centre opening during normal hours in some countries would be unsociable hours in UK
leading to a lower wage bill [3]

(b) Three from:

The operator will be able to understand most UK dialects


The customer will usually be able to understand operator’s accent
Operators should not have difficulty with UK culture
Operators may not have to stick to script/may be able to answer
out of the ordinary questions [3]

12 (a) Three from:

Type in the address of the school correctly


Enter a suitable subject line related to the message
Make sure the message is encrypted
Compress the file
…using a suitable format/using suitable compression software [3]

(b) Four from:

Anti-virus software will quarantine the attachment so that you cannot open it
File could be corrupted in transmission
Might not have the software needed to open it
Might not have the software required to decompress it
The file was not attached
Might not have the password required to decompress it [4]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 11

(c) Five from:

Use AND operator so that more than one condition must be met which will reduce the
number of hits
Use OR operator so that only one of at least two conditions needs to be met which will
increase the number of hits
Use NOT operator so that items failing to meet a condition are removed to exclude unwanted
results
Use quotes to limit the items to those that match the condition exactly which will reduce the
number of hits
Use wild cards so that any one of a number of matching items will result which will increase
the number of hits
Use a different type of search engine so that different results may be obtained [5]

13 (a) Phishing [1]

Pharming [1]

Spyware [1]

Hacking [1]

Viruses [1]

Cookie [1]

(b) (i) Encryption [1]

(ii) Two from:

Causes data to be scrambled/encoded


Requires an encryption key/software to encrypt
Requires a decryption key/encryption software to decrypt
Results in data which is not understandable/readable
Protects sensitive data
…from being understood if it falls in to the wrong hands [2]

(c) Four from:

Detailed description of use of passwords and user IDs


Detailed description of SSL or TLS
Description of use of drop down menus to prevent access by keyloggers
Detailed description of anti – spyware software
Detailed description of firewall – hardware – or software-based, that controls incoming and
outgoing network traffic based on a set of rules [4]

[Total:80]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 5 3 3 7 7 8 9 1 6 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 October/November 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (LM) 116412
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3 and 4

The Queen Elizabeth Hospital uses computers to help run its intensive care unit. Nurses are still
required to take some readings relating to the condition of the patients. The computer will alert a nurse
if readings reach dangerous levels.

The hospital also uses computers to store and retrieve confidential records of all patients. This database
needs to be accessed at any time of day. When data is analysed for the purpose of producing statistics
it is usually in summarised form to protect patient confidentiality.

© UCLES 2015 9713/12/O/N/15


3

1 Tick the four advantages of using computers in intensive care.

Advantage

Computers can monitor patients continuously.

Nurses never get tired and never forget to take readings.

Readings taken by nurses are more accurate than computers.

Computers can measure more than one variable at any one time.

When nurses take readings charts are produced automatically.

Nurses are faster than computers to react to changes in a patient’s condition.


A computer can monitor the condition of several patients at the same time
leaving nurses free to do other tasks.
Computers do not cost any money.

A computer can only monitor one condition at a time.


The use of computers to take readings reduces the chances of nurses being
exposed to contagious diseases.
[4]

2 Tick the four statements referring to the use of computers in intensive care which are true.

Advantage

Sensors store the pre-set value.

Sensors feed back data to the computer.


If the patient’s blood pressure is too high the sensor sends the reading to the
computer.
The sensor readings are converted from digital to analogue so the computer can
process them.
The computer compares any data fed back by a sensor to a pre-set value.

The computer is unable to produce charts showing the patient’s progress.


Sensors are used to monitor a patient’s physical variables such as blood
pressure, pulse rate and body temperature.
The computer cannot take readings without the nurse supervising it.

If any data is outside the pre-set range the computer sounds an alarm.

The process is not continuous.

[4]
© UCLES 2015 9713/12/O/N/15 [Turn over
4

3 Explain why batch processing would not be used to warn the nurses about a patient’s condition
worsening.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

4 Name and describe two methods by which patient information could be summarised to help keep
patient data confidential.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2015 9713/12/O/N/15


5

Scenario 2
Questions 5 and 6

Paula Richards is employed by a company to visit and inspect its stores. She spends most of her
time travelling.

Paula produces her reports using her laptop computer. She also has a smartphone which she
uses for other aspects of her work.

Some of the stores she visits are quite large and the management teams have equipment which
allows them to video conference with Paula when she returns to head office to discuss her report.

© UCLES 2015 9713/12/O/N/15 [Turn over


6

5 Using aspects of the scenario, describe four different uses she could make of her smartphone to
help her in her work.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..................................................................................................................................................... [4]

6 Describe five steps involved in setting up a video conference.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..........................................................................................................................................................

5 ......................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2015 9713/12/O/N/15


7

Scenario 3
Questions 7, 8, 9, 10 and 11

First Call Fashions is a very large mail order catalogue company which sells a variety of clothes in the
UK. Stella, the owner, has decided to computerise the company operations. She has employed Rafael,
a systems analyst, to supervise the process.

Rafael will analyse the current system. He will need to establish the inputs and outputs of the system.

As part of the design stage he will need to design a screen input form to input the details of all the
clothes.

He will need to produce user documentation for the system. User documentation often gives guidance
on how to use the system such as:

• How to load software / run software / install software


• How to save a file
• How to search
• How to sort
• How to print
• How to add records
• How to delete/edit records

When the system is fully developed he will need to evaluate it.

Stella is going to open a call centre so that customers can phone in for help with their orders. She is
considering whether to open it in the UK or overseas.

© UCLES 2015 9713/12/O/N/15 [Turn over


8

7 Rafael wants to establish the inputs and outputs of the current system.
Describe three items he will identify as a result of examining documents.

1 ......................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2015 9713/12/O/N/15


9

8 (a) Apart from navigation aids, describe five features of a well-designed screen-based data input
form.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

.............................................................................................................................................. [5]

(b) Describe four advantages of using a screen form rather than a paper-based form to collect
the data.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9713/12/O/N/15 [Turn over


10

9 (a) Apart from those uses listed in the scenario, describe four other items which would be
contained in the user documentation, including the reason for their inclusion.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(b) Describe three drawbacks of Rafael not providing technical documentation.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/12/O/N/15


11

10 Describe in detail, three methods of obtaining feedback from users of the new system and for
each one give a different drawback of the method.

Method 1 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 1 ......................................................................................................................................

..........................................................................................................................................................

Method 2 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 2 ......................................................................................................................................

..........................................................................................................................................................

Method 3 ..........................................................................................................................................

..........................................................................................................................................................

Drawback 3 ......................................................................................................................................

..................................................................................................................................................... [6]

11 (a) Give three advantages of using overseas call centres from the company’s point of view.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

(b) Give three advantages of using UK call centres from the point of view of the customer.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9713/12/O/N/15 [Turn over


12

Scenario 4
Question 12

Joan is a manager of a department in an examination board. She wants to introduce a multimedia ICT
qualification. Eventually, she will send multimedia files by emails to the schools taking the qualification.

She also uses the internet to search for resource materials for the qualification but sometimes cannot
obtain the required information.

© UCLES 2015 9713/12/O/N/15


13

12 (a) Describe what Joan has to do to prepare an email in order to send a very large attachment.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) A school receives the email but cannot open the attachment.
Give four reasons why this may happen.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

.............................................................................................................................................. [4]

(c) Describe, including the use of Boolean operands, five different ways Joan could better target
her searches when using the internet.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2015 9713/12/O/N/15 [Turn over


14

Scenario 5
Question 13

Hightown Bank, New York, operates an online banking system. A number of customers are concerned
about the security of their accounts.

© UCLES 2015 9713/12/O/N/15


15

13 (a) Identify the security risks which are described below:

Legitimate-looking emails sent out to customers pretending to be


from a bank; when the link in the email is clicked, the customer is
sent to a fake website. ..................................

Malicious code put into a user’s computer or server. When the


user selects the website they are sent to a fake website instead
without their knowledge. ..................................

Software on a user’s computer that monitors all key presses. ..................................

Illegal access to a computer where data can be deleted, changed


or used for malicious purposes. ..................................

Software that can replicate itself. Once installed on the computer,


it can cause it to operate slowly or delete or corrupt files. ..................................

Small file installed on a user’s computer after visiting a website.


This allows user preferences to be remembered each time they
visit the website. .................................. [6]

(b) This message is sent from a computer “ICT affects all aspects of our lives”.
It is converted so that when it arrives at another computer it is seen as “RXG zuuvxgh zoo
zhkvxgh lu lfi orevh”.

(i) State the name given to this process of conversion.

...................................................................................................................................... [1]

(ii) Describe how it is used as a form of security.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2015 9713/12/O/N/15 [Turn over


16

(c) Describe, in detail, four other safeguards that the bank could use to protect customer account
information.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/12/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/12 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 12

1
Computers can monitor patients continuously. 

Nurses never get tired and never forget to take readings.

Readings taken by nurses are more accurate than computers.

Computers can measure more than one variable at any one time. 

When nurses take readings charts are produced automatically.

Nurses are faster than computers to react to changes in a patient’s


condition.

A computer can monitor the condition of several patients at the same time

leaving nurses free to do other tasks.

Computers do not cost any money.

A computer can only monitor one condition at a time.

The use of computers to take readings reduces the chances of nurses being

exposed to contagious diseases.
[4]

2
Sensors store the pre-set value.

Sensors feed back data to the computer. 

If the patient’s blood pressure is too high the sensor sends the reading to
the computer.

The sensor readings are converted from digital to analogue so the computer
can process them.

The computer compares any data fed back by a sensor to a pre-set value. 

The computer is unable to produce charts showing the patient’s progress.

Sensors are used to monitor a patient’s physical variables such as blood



pressure, pulse rate and body temperature.

The computer cannot take readings without the nurse supervising it.

If any data is outside the pre-set range the computer sounds an alarm. 

The process is not continuous.


[4]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 12

3 Three from:

Batch processing is the processing of transactions/data in sequence but monitoring is real time
Data is collected in batches and then run altogether but data needs to be collected continuously
Batch processing is only suitable for applications where results of processing is not time critical
but monitoring is time critical
Warning to nurses would have to be given without any delay [3]

4 Anonymising information [1]


Individual records are summarised without mentioning the person by name [1]

Aggregating information [1]


Personal details of individuals are combined to provide summarised
information without naming those individuals. [1]

5 Four from:

Organise appointments with stores


Send emails to stores/company
Store contact details of store managers
Send/receive texts to keep in contact with the office/manager
Phone to contact stores/management teams/head office
Take photos of stores/management teams [4]

6 Five from:

Agree a date and time


Send a reminder shortly before start
…including access to password/PIN
Ensure webcam, microphone, speakers are ready
Carry out tests on microphone and speakers/headphones
Adjust webcam so participants can be seen
Log on to the system/internet
Ensure video conferencing software/internet connection is running properly/installed
Create room(s)/environment
Enter virtual room [5]

7 Three from:

Identify the sources of input data


Identify the volume of input data
Identify the data collection methods
Identify the input documents currently in use
Identify the output documents currently in use
Identify the computer procedures necessary to achieve the current output [3]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 12

8 (a) Five from:

Drop down menus


Submit/Save button
Exit button
Adequate space for field contents
Fonts/font size should be easy to read
Instructions how to complete form/help button
Clearly labelled field names
Fields spaced out/group relevant fields together
Sensible colour scheme
Use of tick boxes/radio buttons [5]

(b) Four from:

Easier to correct
Easier to duplicate data when records contain the same data
Easier to move to a particular record for editing purposes
Easier to read/clearer data in free text fields
Built in validation rules to prevent missing data in fields/making sure data is
reasonable/prevent errors [4]

9 (a) Four from:

The purpose of the system to give an overall description of what the system does
The input and output formats, so that you know how to enter data and know what the output
will look like
The hardware and software needed to run the system so that the user doesn’t use the wrong
hardware/software
Examples of sample runs of the system so that the user can tell if they are using the system
in the correct way.
Troubleshooting guide/a list of Frequently Asked Questions to know what to do when errors
occur [4]

(b) Three from:

The systems analyst would not have a detailed overview of the whole system
It would be difficult for programmers/systems analyst to amend the system to eliminate errors
Programmers would have difficulty fully understanding the program code that has been used
It would be difficult to develop further the system or upgrade it [3]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 12

10 Method: Could observe users performing set tasks and record their progress using video
recording/get an user to perform a task and measure the time it takes them to carry out the task
[1]
Drawback: Description of the Hawthorne effect [1]

Method: Interview users to gather their responses about what they thought of the system and
how easy it was to use [1]

Drawback: Users have to be available at the time the analyst wants to interview them/ time
consuming as it may take a long time to interview all the users/may get answers which the user
thinks the analyst wants to hear [1]

Method: Hand out questionnaires to users to ask them about their thoughts on the new system
with regard to how easy they found it to use [1]

Drawback: They may give answers which are exaggerated as they are anonymous/question
cannot be changed once they are typed up/follow up questions cannot be asked [1]

11 (a) Three from:

Phone operators will be paid less


Buildings needed to house call centres will be cheaper to buy/rent
Call centre opening during normal hours in some countries would be unsociable hours in UK
leading to a lower wage bill [3]

(b) Three from:

The operator will be able to understand most UK dialects


The customer will usually be able to understand operator’s accent
Operators should not have difficulty with UK culture
Operators may not have to stick to script/may be able to answer
out of the ordinary questions [3]

12 (a) Three from:

Type in the address of the school correctly


Enter a suitable subject line related to the message
Make sure the message is encrypted
Compress the file
…using a suitable format/using suitable compression software [3]

(b) Four from:

Anti-virus software will quarantine the attachment so that you cannot open it
File could be corrupted in transmission
Might not have the software needed to open it
Might not have the software required to decompress it
The file was not attached
Might not have the password required to decompress it [4]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 12

(c) Five from:

Use AND operator so that more than one condition must be met which will reduce the
number of hits
Use OR operator so that only one of at least two conditions needs to be met which will
increase the number of hits
Use NOT operator so that items failing to meet a condition are removed to exclude unwanted
results
Use quotes to limit the items to those that match the condition exactly which will reduce the
number of hits
Use wild cards so that any one of a number of matching items will result which will increase
the number of hits
Use a different type of search engine so that different results may be obtained [5]

13 (a) Phishing [1]

Pharming [1]

Spyware [1]

Hacking [1]

Viruses [1]

Cookie [1]

(b) (i) Encryption [1]

(ii) Two from:

Causes data to be scrambled/encoded


Requires an encryption key/software to encrypt
Requires a decryption key/encryption software to decrypt
Results in data which is not understandable/readable
Protects sensitive data
…from being understood if it falls in to the wrong hands [2]

(c) Four from:

Detailed description of use of passwords and user IDs


Detailed description of SSL or TLS
Description of use of drop down menus to prevent access by keyloggers
Detailed description of anti – spyware software
Detailed description of firewall – hardware – or software-based, that controls incoming and
outgoing network traffic based on a set of rules [4]

[Total:80]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 8 8 6 7 2 7 5 1 4 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 October/November 2015
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use a pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (CW) 101353/2
© UCLES 2015 [Turn over
2

Scenario 1
Questions 1, 2, 3, 4 and 5

NewProperties are a newly formed house building company that wishes to advertise in the local area.
They could create and use:

• Flyers to distribute to houses


• Posters placed in strategic locations
• A website
• A multimedia presentation in a local shopping mall

The company carried out a trial of allowing their house designers to work from home. After the trial it
was decided that they would prefer their designers to be office-based in order to work on the design of
a new house.

However, a number of workers have asked the manager Bertrand if they can work part-time. Bertrand
has agreed providing each worker can find another worker to job share.

Bertrand uses time management software to track the progress of the building of houses at a new site.

John, a foreman, is in charge of the workers at the building site. He uses a smartphone to stay in
contact with Bertrand.

© UCLES 2015 9713/13/O/N/15


3

1 There are a number of advantages and disadvantages of using various advertising methods.

For each statement below, tick the most appropriate answer.

(a) Flyers:

Flyers are usually produced using presentation software.

You can distribute them so that they only go to the people you want to see them.

They are very expensive to produce.

They can hold more information than a website.


[1]

(b) Posters:

Posters are never defaced.

Posters are smaller than flyers.

Posters are produced using a standard printer.

Posters will not necessarily be noticed by everybody.


[1]

(c) Websites:

A small potential customer base is covered by using a website.

Paying website designers is much cheaper than producing a flyer.

Websites are less interactive than posters.

Websites are easier to update as you do not have to reprint the whole advertisement.
[1]

(d) Multimedia presentations:

Uses sound and video unlike flyers.

They are produced more quickly than flyers.

You can cover a wider audience than a website would.

It would cost less to pay a company to produce this rather than produce their own flyers.
[1]

© UCLES 2015 9713/13/O/N/15 [Turn over


4

2 Tick the four statements which are benefits to the company of workers working in the office rather
than at home.

Benefit

They can pay the workers lower salaries.

It is easier to get all the workers together for meetings and briefings.

It would be easier for managers to supervise workers.

Not so much money would have to be spent on the company’s utility bills.

Workers would work longer hours.

Travelling expenses would have to be paid to employees to attend face to face conferences.

Do not have to subsidise home workers’ equipment.

Data is more secure as it does not leave the office.

Workers would not have to travel so far to work.

There would be fewer workers.


[4]

© UCLES 2015 9713/13/O/N/15


5

3 (a) Describe, in detail, what is meant by part-time working.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe, in detail, what is meant by job sharing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/13/O/N/15 [Turn over


6

4 (a) Describe two different types of calendar used with time management.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(b) Two aspects of time management software are shown on the left. Five descriptions are shown
on the right.
By drawing five lines, connect each aspect to an appropriate description.

software advises when


clashes occur

software helps with daily


and weekly planning
organising meeting times
software provides a critical
path method of scheduling
project management
software is used to keep a
record of appointments

Gantt charts used to


represent parallel and
sequential activities
[5]

5 Name and describe four methods of communication that John can use when contacting Bertrand
using his smartphone.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2015 9713/13/O/N/15


7

Scenario 2
Questions 6, 7 and 8

Grafton Mail Order Catalogue Company currently operates by receiving orders from its customers by
phone. They have a large call centre for this purpose. Due to the prolonged use of computers there are
a number of health and safety issues.

They are going to extend the way they receive orders by having an online system.
The company has a database of customer orders and personal details.

Grafton has employed Oscar to supervise the development of the new system. Oscar has already ruled
out using parallel running to implement the new system but is not sure which of the other methods to
use.

After the system is implemented Oscar will provide documentation to go with it.

© UCLES 2015 9713/13/O/N/15 [Turn over


8

6 (a) Identify two items of ICT hardware that an operator in the call centre would have at their desk
including a description of the purpose of each.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

(b) Name the two different types of call control and describe the type that would be best suited
for use in the call centre. Within your description give a reason.

1 ................................................................................................................................................

2 ................................................................................................................................................

Description ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(c) Using examples, describe the difference between health risks and safety risks.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2015 9713/13/O/N/15


9

7 (a) Other than security issues, describe four drawbacks to the customer of on-line shopping.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

(b) Other than security issues, describe four drawbacks to the company of introducing on-line
shopping.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/13/O/N/15 [Turn over


10

(c) Apart from not having to travel, describe four benefits to the customer of introducing on-line
shopping.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

8 (a) When introducing a new computer system, phased implementation or direct changeover can
be used.

Describe each method and for each method, give one different advantage and disadvantage
compared with parallel running.

Phased
implementation .........................................................................................................................

...................................................................................................................................................

Advantage .................................................................................................................................

...................................................................................................................................................

Disadvantage ............................................................................................................................

...................................................................................................................................................

Direct changeover .....................................................................................................................

...................................................................................................................................................

Advantage .................................................................................................................................

...................................................................................................................................................

Disadvantage ............................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/13/O/N/15


11

(b) Describe four items of program documentation that Oscar will provide.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/13/O/N/15 [Turn over


12

Scenario 3
Questions 9 and 10

Omar is the owner of a small company which manufactures computers. He wishes to computerise the
stock control of his business.

He needs a system which will store records of all the computers his company makes. From time to time
he will need database reports to give him information about the computers he has in stock.

Examples of serial numbers for the computers are T123456, L342167, and P789456. The first letter in
the serial number is the type of computer and the first digit in the serial number is the manufacturer’s
number.

He currently uses a spreadsheet to store serial numbers as:

A B C
Manufacturer’s
1 Serial Number Type
number
2
3 T123456 T 1
4 L342167 L 3
5 P789456 P 7

Formulas are used in columns B and C to extract the data from the serial number.

As well as the serial number, the new system will store the price of each computer. His basic model,
which is the cheapest, sells for $300. The Impressor, which is the most expensive, sells for $1500.
He only sells tablet computers, laptops and PCs.

He has asked Louisa, a systems analyst, to analyse the current system and then design a new one.

© UCLES 2015 9713/13/O/N/15


13

9 (a) Write down the formula which Omar has used in cell B3.

...............................................................................................................................................[2]

(b) Write down the formula which Omar has used in cell C3.

...............................................................................................................................................[3]

10 (a) Using the data given in the scenario, describe three validation rules which would be designed
to check whether the data is acceptable or not.

Rule 1 .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Rule 2 .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Rule 3 .......................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2015 9713/13/O/N/15 [Turn over


14

(b) Discuss the benefits and drawbacks of interviews, questionnaires and observation for
collecting information about the existing system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(c) Describe four features of a well-designed report.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2015 9713/13/O/N/15


15

(d) Louisa is recommending the use of an inkjet printer for printing the reports. Give two reasons,
compared to other printers, why she has done this.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2015 9713/13/O/N/15


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9713/13/O/N/15


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the October/November 2015 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/13 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2015 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some
Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

1 (a)
Flyers are usually produced using presentation software.

You can distribute them so that they only go to the people you want to see

them.

They are very expensive to produce.

They can hold more information than a website.


[1]

(b)
Posters are never defaced.

Posters are smaller than flyers.

Posters are produced using a standard printer.

Posters will not necessarily be noticed by everybody. 


[1]

(c)
A small potential customer base is covered by using a website.

Paying website designers is much cheaper than producing a flyer.

Websites are less interactive than posters.

Websites are easier to update as you do not have to reprint the whole

advertisement.
[1]

(d)
Uses sound and video unlike flyers. 

They are produced more quickly than flyers.

You can cover a wider audience than a website would.

It would cost less to pay a company to produce this rather than produce
their own flyers.
[1]

© Cambridge International Examinations 2015


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

2
They can pay the workers lower salaries.

It is easier to get all the workers together for meetings and briefings.  [1]

It would be easier for managers to supervise workers.  [1]

Not so much money would have to be spent on the company’s utility bills.

Workers would work longer hours.

Travelling expenses would have to be paid to employees to attend face to


face conferences.

Do not have to subsidise home workers equipment.  [1]

Data is more secure as it doesn’t leave the office.  [1]

Workers wouldn’t have to travel so far to work.

There would be fewer workers.

3 (a) Two from:

Working less than the normal working hours of a full time employee
Working mornings or afternoons only, rather than a whole day
Working fewer days, rather than a full working week [2]

(b) Two from:

Two people sharing a job normally done by one person


Each person is paid on a part time basis though together they do a full time job
One person works specific days/mornings/afternoons while other works the remainder [2]

4 (a) Public calendars keep a record of meetings and appointments of all workers so that they can
all access it to arrange meetings [1]
Private calendar keeps a detailed record of meetings and appointments of a worker so that
only he/she can see these [1]

© Cambridge International Examinations 2015


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

(b)
software advises when
clashes occur

software helps with daily


and weekly planning
organises meeting times
software provides a critical
path method of scheduling

software used to keep a


project management
record of appointments

Gantt charts used to


represent parallel and
sequential activities

One mark for each correctly placed line [5]

5 Four descriptions from:

Send emails
Send texts
Phone call
Instant messaging
Video call [4]

6 (a) Two from:

Computer to process the calls/look up customer information/to record orders


Monitor to display customer/call details
Headset to speak with/listen to customers
Keyboard to type up details of the call/action taken [2]

(b) First party call control [1]


Third party call control [1]

Two from:

Requires a dedicated telephony server (to connect the telephone network and the
computer network)
Operator’s phone communicates directly with the server
Operator’s phone is not directly connected to their computer
The server controls all the phones
The server can direct a call to the appropriate operator
Any computer in the system can control any phone [2]

Third party: Reason is because it is suitable for large call centres [1]

© Cambridge International Examinations 2015


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

(c) Health risks arise from long term use of computers [1]

Two from:

Staring at a computer screen continuously can cause problems with one’s sight
Typing at a keyboard continuously can cause RSI
Gripping a mouse and repetitive clicking can cause carpal tunnel syndrome/RSI
Sitting in the same position/with wrong posture all day can cause lower back pain
Staring at a computer screen all day can cause eye strain/headaches
Poor positioning of screen can cause upper back/neck/shoulder pain/eyestrain/headaches
Glare from screen can cause eye strain/headaches [2 max]

Safety risks can result in a sudden accident [1]

Two from:

Too many plugs connected to a socket/overheating of computers can be a fire hazard


Bare wires can cause electrocution
Trailing wires could cause an operator to trip over
Heavy equipment incorrectly positioned can fall off a desk and cause injury [2 max]

7 (a) Four from:

Can order goods and they do not get delivered


Goods are not to the same standard as those ordered/cannot check the standard of goods
before buying
May be hidden costs such as delivery charges
Expense of buying a computer with a broadband internet connection/must have a reliable
electricity supply/basic computer skills
May lose contact with their friends/less socialising as they may not go out of the house as
much
Disabled people may have problems navigating through screens
Customers who do not have a credit/debit card will not be able to use online shopping [4]

(b) Four from:

Less face to face contact, so it is harder to sell other services


Running costs/initial cost, such as having to pay website developers
Initial costs such as buying the hardware when starting up
Initial costs such as redundancy payments
May need to retrain staff, which is costly/time consuming
More delivery staff needed, so costs increase [4]

© Cambridge International Examinations 2015


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

(c) Four from:

Do not have to spend time queuing in online shopping/going around different shops
Can shop at any time of day or night/at a convenient time for them
Can compare products and prices at their leisure/more easily
There will be a greater choice of goods
Items are usually cheaper as staff costs are lower/rental/running costs are lower than
shopping malls [4]

8 (a) One mark per point

Phased implementation – implementing one part of the system while rest of system remains
unchanged/implementing system part by part

Advantage – Cheaper than parallel running as you do not employ two complete
sets of workers

Disadvantage – If there is a problem with the new system, only have bulk of old
system to fall back on/parallel running has whole system

Direct changeover – involves replacing the old system with the new system all in one
go/immediately/overnight

Advantage – Cheaper than parallel running as you don’t have to employ two
sets of workers (if not mentioned before)/quicker method of
implementation as there is no delay waiting for bugs to be fixed
/benefits of the new system become apparent immediately

Disadvantage – If there is a problem with the new system do not have old system
to fall back on [6]

(b) Four from:

Description of the software/purpose of the software


Reasons for choosing those pieces of existing software that were used instead of the
programmer having to write code
Input and output data formats
Program flowcharts/algorithms
Program listing – a complete copy of the code used with annotation explaining what each
module of code does
Notes that will help any future programmer to make modifications to the system [4]

9 (a) LEFT(A3,1)

LEFT – 1 mark
(A3,1) – 1 mark [2]

© Cambridge International Examinations 2015


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

(b) MID(A3,2,1)

MID – 1 mark
(A3,2 – 1 mark
,1) – 1 mark [3]

10 (a) Three matched pairs from:

Format check on serial number


Must be one letter followed by six numbers

Range check on price


Must not be less than $300 and no more than $1500

Lookup check on type of computer


Must be tablet, laptop or PC [6]

(b) Six from:

Observation
Benefit –enables the systems analyst to see the process as a whole
Drawback – Description of the ‘Hawthorne effect’

Interviews
Benefits –
Interviewer can move away from their ‘script’ and ask a more in-depth question if a particular
response is given
Can interpret body language
Drawbacks –
Users have to be available at the time the systems analyst wants to interview them
May not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to hear

Questionnaires
Benefits –
Answers tend to be, on the whole, more accurate
Everyone can complete the questionnaire at the same time instead of one after the other (as
with interviews)/can complete it at their leisure
Drawbacks -
They may give answers which are exaggerated as they are anonymous
Questions cannot be changed once they are typed up
Follow up questions cannot be asked

Maximum of 4 marks if only two are compared


One mark is available for a reasoned conclusion [6]

© Cambridge International Examinations 2015


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2015 9713 13

(c) Four from:

Easy to read font


Easy to read font size
Attractive to look at
Based on user requirements
Appropriate headers and footers
Appropriate use of colour
Fields spaced out so the data is clear to read [4]

(d) Two from

Inkjet printer produces higher quality printout than a dot matrix printer
They are faster for printing documents than dot matrix printers’
(They are easier to move than dot matrix printers)
Small company, so changing cartridges, which is not so necessary with laser printers and dot
matrix printers, is not an issue [2]

[Total:80]

© Cambridge International Examinations 2015


Cambridge International Examinations
Cambridge International Advanced Level
* 6 5 7 5 4 3 0 6 1 8 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages and 4 blank pages.

DC (KN) 114996/2
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2 and 3.

Individuals and businesses use different types of internet auctions to buy and sell goods.

Buyers can use the auction website to search, look at and buy items that are offered for sale by
individuals or businesses.

Buyers can pay sellers for the items using credit cards.

Buyers can also use other ways of paying for the goods.

© UCLES 2016 9713/32/M/J/16


3

1 (a) Describe, in detail, three different types of internet auction.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/32/M/J/16 [Turn over


4

(b) Explain why buyers might be worried about using internet auctions to buy goods.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/M/J/16


5

2 (a) Explain the advantages to a buyer of using a credit card to pay for goods purchased using
an internet auction.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Explain the disadvantages to a seller of allowing buyers to use a credit card to pay for goods
purchased using an internet auction.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/M/J/16 [Turn over


6

3 Describe other ways that a buyer can safely pay for goods purchased using an internet auction.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/32/M/J/16


7

BLANK PAGE

© UCLES 2016 9713/32/M/J/16 [Turn over


8

Scenario 2

Questions 4, 5 and 6.

A supermarket uses a computerised stock control system to try to ensure that it has enough items to
sell. Each item stocked by the supermarket has its own linear (one-dimensional) barcode, for example:

The supermarket is considering adding matrix (2D or two-dimensional) barcodes to the items, for
example:

Customers may use a manned POS checkout to pay for the items when they have finished their
shopping. The supermarket also provides a facility for customers who wish to scan the items themselves
before paying at a self-service kiosk.

Customers can use a hand-held ‘scan and go’ device or a mobile phone for self-service scanning.

© UCLES 2016 9713/32/M/J/16


9

4 (a) Explain how information is represented in a linear barcode system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Describe the benefits of adding matrix barcodes on the items in the supermarket.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/M/J/16 [Turn over


10

5 Describe how a customer would make use of the hand-held ‘scan and go’ system in order to be
able to pay for items at a self-service kiosk.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

6 Describe the benefits and drawbacks of the use of self-service systems in supermarkets.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/32/M/J/16


11

BLANK PAGE

© UCLES 2016 9713/32/M/J/16 [Turn over


12

Scenario 3

Questions 7 and 8.

A group of scientists are studying the plant life found in a remote area of rain forest.

The scientists have access to an expert system created especially to assist them when identifying the
plants.

© UCLES 2016 9713/32/M/J/16


13

7 (a) Explain four benefits to the scientists of using the expert system to assist them in identifying
the plants.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Explain four drawbacks to the scientists of using the expert system to assist them in
identifying the plants.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/M/J/16 [Turn over


14

8 (a) Describe how the knowledge base is set up with the facts required to identify plants.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Explain how each of the following is used by the inference engine to identify a plant.

(i) forward-chaining

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) backward-chaining

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9713/32/M/J/16


15

BLANK PAGE

© UCLES 2016 9713/32/M/J/16 [Turn over


16

Scenario 4

Questions 9, 10 and 11.

A school has a computer network for use by the staff and students. A file server stores the details of the
students and their academic progress. The staff are issued with a user name (user ID) and a password
so that they can access the student details over the network and over the internet.

The school network, protected by a firewall, allows internet access and the staff and students can use
the World Wide Web via a proxy server.

The geography teachers at the school use information and communication technology (ICT) in their
teaching.

© UCLES 2016 9713/32/M/J/16


17

9 Discuss the benefits and drawbacks to the students of being taught geography by the use of ICT.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/M/J/16 [Turn over


18

10 Explain how each of the following helps to keep student data held on the school network, from
being accessed by unauthorised users.

(a) a firewall

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) encryption

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 9713/32/M/J/16


19

11 Explain why the school’s internet access is routed via a proxy server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/32/M/J/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/32/M/J/16


Cambridge International Examinations
Cambridge International Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/32


Paper 3 Written B May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 7 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

1 (a) Three descriptions from e.g.: [6]

Ascending bid auction with all bids open for all bidders to see
…time limitation on bidding process
…buyers bid on item and highest bid gets the item
…bid (usually) has to meet reserved price
Descending bid auction price starts high but is lowered until a bid is accepted by seller
Single/first-price sealed bid auction where bids not viewable by all buyers
…highest bid gets the item
Second price sealed bid auction where highest bidder pays price bid by the second highest
bid
Reverse auction which has multiple sellers competing…
…on prices to attract buyers
Bidding fee auction where buyers pay to bid on items
…lowest unique bid wins
Business-to-individual auctions where businesses auction items to individuals
Individual-to-individual auctions where individuals sell to other individuals
…buy it now option

(b) Four from e.g.: [4]

Fraud when item is not delivered/sent/provided after payment is made


…item sent is not as described on auction site/item is less valuable than that shown on site
…buyer payment details are used to buy goods/services not authorised by buyer
The auction site may be fake and set up to defraud buyers/difficulty finding authentic auction
sites
Sale of stolen goods…
…to unsuspecting buyers
Fake bids (by seller) to unfairly raise the price so buyer pays more
Seller/auction site lacks protection for buyers when payment is made and goods not received
…site will not pay back money
Security of personal information may be at risk
…liable to e.g. identity theft/fraudulent use of financial details

2 (a) Five from e.g.: [5]

There is no need to send cash in the postal system so it can’t get lost/stolen in transit
Currency transactions are done by the company so no need for exchange by buyer/no need
to worry about changing currencies
Credit card details are often stored on the auction site so cannot be intercepted during
payment
Seller is guaranteed payment by credit card company so there is no delay before goods are
sent/seller receives money quickly
Buyer does not have to pay the full amount at once/can spread payments
Consumer protection in many countries means that if goods faulty/do not arrive then money
can be claimed from credit card company.

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

(b) Four from e.g.: [4]

Credit card company will make a charge for each transaction so increased costs to seller
Cost of equipment/administration fees to process credit card transactions
Buyers can request a chargeback if dissatisfied up to six months after the transaction
…seller has to spend time/money proving that the purchase was legitimate
Credit card might be stolen/cloned so payment is refused/ reclaimed after the goods sent out

3 Four from e.g.: [4]

Third-party/escrow:
Buyer orders/buys goods and securely pays third-party
Third-party holds the payment
Third-party tells seller that payment has been received and goods can be despatched
Buyer receives goods and inspects to ensure that the goods are satisfactory
Third-party releases payment to seller

Debit cards:
Use of debit cards to immediately transfer cost from buyer account to seller account
Online banking to directly transfer of funds from buyer to seller bank account

Use of vouchers:
Use of vouchers/tokens purchased from auction site to pay for goods

Use of digital currency/bitcoins:


Bitcoins purchased on exchange
…kept in folder (‘wallet’) on smartphone/computer
Value in bitcoins transferred from buyer to seller wallet
…by peer to peer file sharing

Use of cheques (which is a promise to pay) to pay before shipping/wait for clearance of cheque
before shipping
Cash with payment on delivery

4 (a) Five from: [5]

Barcode is made up of black and white lines


…widths and spacings of the lines encode numbers
…code for 1 and 0
Four different thicknesses to lines
…can code as thinnest is ‘1’, thickest is ‘4’

Information represents:
Manufacturer code to identify the manufacturer of the item
Country of origin code to identify the country of origin of item
Universal Product Code (UPC) with a number of digits (12) that uniquely identify the item
Product code to uniquely identify the item
Checksum/check digits to ensure data integrity

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

(b) Four from e.g.: [4]

Can hold more characters


…can code for different characters e.g. symbols, text, numbers
Can recover from severe damage/dirt
…still scannable if only 30% of code is visible
Can be scanned faster
…scanned at greater angles than one-dimensional barcodes
Can be scanned by apps on smartphones
…customers can scan items to find out more information
Can hold links to other related items…
…advertising links/links to promotions/competitions
Can be scanned and used at checkouts to provide lists of items purchased
…during payment

5 Four from e.g.: [4]

Customer collects device from kiosks at entrance to store/Customer enters personal


details/scans card at kiosk to release device
Scan each item as taken from shelf in store
…device calculates (running) total
Can enter product details/number of items manually
Device displays product details/price for customer to check
Can use button to remove item
Take all items and device to kiosk
Scan ‘finish’ code at kiosk/press button indicate finished
Item details transferred wirelessly to POS terminal to kiosk
…total price to pay presented to customer

6 Six from e.g.: [6]

Benefits:
Less staff required at checkout so reduced labour costs
… one staff member can look after 4 self-service kiosks
Reduced floor space taken up by kiosk so more space for goods
… one self-service kiosk takes up 20% of normal checkout space
Customers with few items can check out more quickly since reduced queuing time/more
checkouts…
… more customers can be served in given time leading to greater profits
Customers are not embarrassed when buying personal items/do not have enough money to pay
for all the goods

Drawbacks:
Increased incidence of theft from store leading to increased prices
Loss of personal touch/contact by customers with checkout staff
Customers can be irritated by failure to scan/identify the item being purchased/need to check age
of customer…
…staff member is required
…time taken to remove security tags on expensive items can slow the process of checkout
Spot checks of users required
…triggered by too few items/previous history/unusual purchases/first use
Disabled customers may have difficulties using the system

Max 4 for all benefits or all drawbacks

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

7 (a) Four benefits from e.g.: [4]

Contains the knowledge of many experts/botanists/scientists


Produce results quicker/reduces time taken to produce results
No need to carry/have access to paper records/ information/ reference books
Fewer errors in identification of plants
Can enhance scientist’s own knowledge
Provide permanent record of identification of plant
No need to check with other experts/botanists/scientists if in doubt over findings

(b) Four drawbacks from e.g.: [4]

Expert system does not identify new species of plant/plants not known to science
Expert system needs to be up-to-date to provide the most useful information for the scientists
to use
Scientists need to be trained to use the system
Expert system follows rules while scientists might have “insight”/use common sense
Can lead to demotivation/less thought process by scientists
Updating may take the system offline and make it unavailable
Expert system may not function/may fail in remote area so become unavailable

8 (a) Four from e.g.: [4]

From expert botanists/scientists…


…collected by appropriate method/interview
…analysed and interpreted
…entered into knowledge base
Data mining…
…from existing research documents/botanical records
Set up the rules for analysing the data…
…entering/writing rules base

(b) (i) Three from: [3]

Starts with the data/data driven


…reasons toward the identification/answer/solution
Uses If-Then statements
Searches rules until one is found to be true/If statement is true
…adds results/new information from the Then… statement to knowledge base
…new data can produce new solutions

(ii) Three from: [3]

Starts with the identification/answer/solution/goal driven


…looks for data to support the identification/answer/solution
Uses If-Then statements
…each statement is tested and if true, previous one is also true
…previous statement becomes the ‘new’ goal to be tested
…if not true, added to list of goals for which data must be found

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

9 Eight from: [8]

Benefits from e.g.:


Students can make contact with/view/access students from other places/countries
Students can structure their own learning
Students can repeat tasks as many times as necessary
Students can work at own pace
Students can work on a laptop/mobile device anywhere/no need to be in classroom
Students can view/use/access interactive media of subject matter
Students with disabilities can use on-screen tools to help with studies
Students can have their work be assessed at stages
…and can receive results in a short time
It can be cheaper than regular updates of text books

Drawbacks from e.g.:


Student have less/reduced/no social interaction with a teacher
The students/could go off task
The system is unable to answer all/every questions from student
The system is only available where/when a computing device/network is available

Max six for all benefits or all drawbacks

10 (a) Three from: [3]

Acts as ‘barrier’ between internal and external networks/internet


Scans content of data packet
…reads packet sender’s IP address/reads domain of sender
…checks against database/list of IP addresses
…checks against database/list of forbidden key words
Permits access/passage of packet if not forbidden/ if on allowed list
Drops packet if on forbidden/not on allowed list

(b) Three from: [3]

Student data is scrambled/made unreadable while stored/during transmission on network


…with use of encryption key/software
Requires use of encryption key/software to unscramble the student data for viewing/use by
Use of/access to encryption key/software known only to authorised user/teacher

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 32

11 Six reasons to use/explanations of use of a proxy server from: [6]

Acts as a cache for frequently used remote resources


…to reduce access times/network traffic over internet connection
Acts as a central device/node for filtering of internet access/activity
…to control/require username and password for internet access/activity so that inappropriate
material is not accessed/viewed/inappropriate activities are prevented
Acts as a central device/node for logging/monitoring of internet access/activity
Allows use of multiple (internal) IP addresses through one (external) IP address on internet
…uses network address translation (NAT)
…so many computing devices/computers can be used through one internet connection
Can act as a firewall to restrict/control access to internet

[Total: 80]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Level
* 5 3 9 4 2 5 9 7 0 5 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

DC (NF/CGW) 126909/1 R
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2, 3, 4, 5, 6 and 7

A2Z is a company which specialises in developing new drugs for treating human illnesses.
They use a supercomputer in their research.

Daniel works as a publisher for the company and produces a monthly magazine.

The magazine contains articles about the research being carried out both in the laboratories and at
research sites around the world.

Daniel employs a number of reporters to write the articles for the magazine. The reporters are expected
to gather information from the scientists.

The reporters are provided with a laptop.

Articles may be produced in the offices or while travelling but have to be sent to Daniel in time for
publication in both hardcopy and electronic formats.

© UCLES 2016 9713/33/M/J/16


3

1 Give reasons why a reporter would use each of these input devices when preparing their articles.

(i) A4 scanner

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(ii) microphone

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

2 Describe the limitations of using a laptop for creating an article and sending it to Daniel.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/33/M/J/16 [Turn over


4

3 The resources gathered by the reporters are used by Daniel to produce the article as an automated
document.
Describe how Daniel would do this.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

4 The company prints the magazine using ‘computerised-plate making’.


Describe the printing process, including the use of ‘computerised-plate making’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/33/M/J/16


5

5 The company decides to produce an electronic version of the magazine.


Discuss the benefits and drawbacks of producing the magazine in electronic format.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/33/M/J/16 [Turn over


6

6 A reporter, Victoria, wants to gather information by interviewing some of the scientists by telephone.
Victoria will also use email to ask questions of other scientists.

(a) Discuss the benefits and drawbacks of telephone interviewing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/M/J/16


7

(b) Discuss the advantages and disadvantages of using email rather than face-to-face interviewing
to gather information from the scientists.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/M/J/16 [Turn over


8

7 (a) Describe what is meant by the term ‘supercomputer’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe how supercomputers are used in drug research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/33/M/J/16


9

BLANK PAGE

© UCLES 2016 9713/33/M/J/16 [Turn over


10

Scenario 2

Questions 8 and 9

SRCo is a scientific research company that employs a number of skilled technicians to support the
scientists in its laboratories. The technicians may work in more than one laboratory depending on the
needs of the scientists.

The company has a human resources department that keeps a database. The database stores details
of the technicians. The human resources department issues each technician with an identity badge.

Jasmine works in the human resources department where her job is to create a new record in the
database and issue a badge to a technician when they join the company.

© UCLES 2016 9713/33/M/J/16


11

8 (a) Explain why Jasmine would need to use each of the input devices below when she creates a
new record in the database.

(i) digital camera

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) keyboard

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(b) (i) When a database is created, the fields in the database are usually assigned a data type.
Explain why it is necessary to assign a data type to a field.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/33/M/J/16 [Turn over


12

(ii) The details of each technician are stored in fields in the database. For each of the fields
shown, complete the table to give the most appropriate data type and a reason for
using that type.

Details stored in the Most appropriate data type Reason for using the
field in the database used for that field chosen type

Technician’s last
name

Technician’s gender

[2]

(iii) Explain why it is not appropriate to use a ‘numeric’ data type for the field in the database
that stores the telephone number of the technician.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/33/M/J/16


13

9 Part of the database used by the human resources department is shown in the diagram below.

7HFKQLFLDQ -RE5ROH -RE7LWOH


technician_ID technician_ID title_ID
first_name date_start title_name
last_name title_ID job_description
gender Lab_ID
address
city
post_code /DERUDWRU\
telephone_number Lab_ID
Lab_name
Scientist_ID

(a) Explain why the human resources department uses a relational database rather than a flat
file database for storing the technician details.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/33/M/J/16 [Turn over


14

(b) Explain the relationship between the Technician table and the JobRole table.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Explain the relationship between the JobRole and the JobTitle table.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) When Jasmine enters the details of a newly employed technician, the details are verified and
validated. Explain, with examples from the database, why both validation and verification of
the details are necessary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/M/J/16


15

BLANK PAGE

© UCLES 2016 9713/33/M/J/16 [Turn over


16

Scenario 3

Questions 10, 11 and 12

KemCo is a chemical company that develops, manufactures and markets fertilizers for growing crops.

Colin, the marketing manager, uses computer-based financial models to assess whether or not the
company should develop, manufacture and market a new fertilizer.

The manufacturing process of the fertilizer is monitored and controlled by microprocessors.

Once the fertilizer is ready to sell, Colin uses primary and secondary marketing techniques to help him
market the fertilizer.

© UCLES 2016 9713/33/M/J/16


17

10 Describe how Colin could use a financial model to assess whether or not it would be profitable to
produce a new fertilizer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/33/M/J/16 [Turn over


18

11 The fertilizer manufacturing process is dependent on temperature and pH. Alkali is used to raise
the pH of the fertilizer in the vessel. A diagram of the process is shown below. A microprocessor is
connected to the sensors, valve and heater.

Hopper with alkali

Valve to let in more alkali


Microprocessor

Vessel with
Temperature fertilizer
sensor

pH sensor
Heater

Describe how the microprocessor controls the conditions in the vessel.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2016 9713/33/M/J/16


19

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

Question 12 is on the next page.

© UCLES 2016 9713/33/M/J/16 [Turn over


20

12 (a) Explain the differences between primary and secondary research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe how Colin could use computer-based research techniques to carry out primary
research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/33/M/J/16


Cambridge International Examinations
Cambridge International Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/33


Paper 3 Written B May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 7 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

1 (i) Two from: [2]

Original source is only available in hardcopy


…may need to use software to edit the digital copy of the source
…may contain text that may be imported into article using OCR

(ii) Two from: [2]

…dictate article for future typing


…record a voice memo/audio log about the article
…use of speech-to-text/speech recognition
…to record interviews for use in the article

2 Four limitations of laptops from: [4]

Difficulties when viewing/creating the article on laptops which generally have smaller screens and
keyboards presenting
Image processing can be slower on laptops which usually have lower specification/ slower
processors / less memory (RAM)/ smaller hard drive with slower access times for the same cost
as e.g. desktop computer
Laptops are inherently more vulnerable to damage and theft so more risk of loss of article
Power management issues e.g. limited battery life so more difficult to manage when away from
office
Connecting to outside networks may require configuration skills/more technical skill to connect
when away from office
Repairs are more difficult than when away from office/traveling

3 Four from: [4]

Ensure resources are all electronic


Gather assets/resources into common/shared area
Convert assets/resources into suitable format for inclusion into final document
Create master document/template
Use of copy/paste of resources into master document
Use of hyperlinks embedded in the master document/template
Use of embedded object linking to include remotely stored assets/resources

4 Four from: [4]

Text and images/assets are brought together


Media/plate held in precise position
Plate wrapped around drum rotating on its axis/plate is put in cylinder and head move long axis/
plate on flat bed and laser is deflected by mirrors line by line
Computer data used to control the laser/ultraviolet to produce image on plate/drum
Separate plates are created for different colours
Plate/drum uses to print onto paper

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

5 Four from: [4]

Benefits:
Reduction in time taken from conception to publication
Storage space for the product/assets is virtually unlimited
Fewer overheads e.g. distribution costs means lower cost of production
Distribution of electronic publications is faster than printed/hardcopy
Can include links/multimedia to illustrate/enhance the content

Drawbacks:
Different formats exist so magazine has to be made available in several formats
Content is not secure compared to printed format/content can be copied more easily
Perceived lack of ‘quality’ in electronic publications

6 (a) Six from: [6]

Benefits:
There is no significant time delay between question and answer
Interviewer can more easily ask extension questions based on answers
…that can add to the verbal answer from the interviewee/scientist
People from all over the globe can be interviewed
Enables interviewers/reporters to contact people in restricted areas e.g. laboratories for
medical research
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview can easily be recorded for later transcription/reference

Drawbacks:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Telephone line quality can affect responses
Easier for interviewee/scientist to find excuse/make up excuse/find reasons to terminate the
interview

Max 4 for all benefits or all drawbacks

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

(b) Six from: [6]

Advantages:
Can interview scientists that are not easy to access e.g. in restricted areas
Easier to ask lengthy questions that require a detailed response
Can use emoticons
The lack of nonverbal and social cues can reduce miscommunication due to cultural diversity
Reporter/scientist has some degree of anonymity so reporter may get more information from
scientist
Reporter has time to formulate questions/scientist has time to construct reply
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview dialogue/exchange/emails easily kept for reference
Can use translating tools to interview in different/foreign languages

Disadvantages:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Reporter has to adapt to email style of scientist
Reporter has to wait for reply which might be a long time
Scientist may never reply/may terminate the contact without notice
Reporter may have to send reminders

Max 4 for all benefits or all drawbacks.

7 (a) Two from: [2]

Very large number of processors/multi-core processors running in parallel


Processors close together in a ‘computer cluster’
Processors can be distributed across a network/the ‘cloud’
Can process trillions of operations per second
Can run different operating systems on different nodes/processors in cluster

(b) Four from: [4]

Computer can be used to scan/search through databases of molecules/chemicals/drugs to


find chemical compounds that could be used as basis for new drugs
Computer can be used to scan/search through databases of human genome for possible
new drug treatments for e.g. cancer
Computer used to cross-match results of previous research with results of new drug under
development
Computer can be used to create/run a model of the effects of the drugs/chemicals on
subject/human body
Computer can be used to predict the effects/possible side effects of the new drug
Computer can be used to monitor amount of chemicals/ingredients being used

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

8 (a) (i) One from: [1]

Needed to take photograph of employee/technician for use on ID card/to store in


employee/staff database

(ii) One from: [1]

Needed to type/enter characters to input details of new technician into the database

(b) (i) Two from: [2]

…not practical to have the computer spend time processing the data to determine how
best to store it
Allows validation rules to be easily applied to the data
…determines/places constraints on the values that are possible in a field
…to ensure the integrity of the data
Makes it easier to determine other properties of the field
…e.g. format of data within the field/maximum size of a field value/use of the field data in
expressions/ whether or not the field can be indexed/size of the database
Allows use of storage space to be optimised

(ii) Two from (one mark for a matching data type and a valid reason): [2]

Details stored in Most appropriate Reason for using


the field in the data type used for the chosen type
database that field
Name can contain
Technician’s last
Text/character/ almost any
name
alphanumeric/ string printable character
Technician’s Boolean Only two choices
gender

(iii) One explanation from (max 2 marks per explanation): [2]

Telephone numbers may contain spaces; spaces are not numbers so could not be
entered
Telephone numbers may contain letters, letters are not numbers so could not be entered
There is no need/requirement for mathematical calculations on telephone numbers
Some telephone numbers have a leading zero which makes it text
Some telephone numbers have a leading plus/+ which makes it text

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

9 (a) Four from: [4]

Data is stored only once/one record per technician/avoids data duplication so less storage
space is needed
Data is stored only once/one record per technician no need to update multiple
records/deletion or modification of data is simpler/quicker
…changes are cascaded to other tables
Complex queries can be carried out by extracting data from multiple tables
Enhanced security access to tables can be restricted on individual table basis
Database can be expanded easier than a flat file database by adding new tables and
creating new links
Ensures referential data integrity

(b) One-to-many because each technician has more than job role [1]

(c) one-to-one each job role has only one title [1]

(d) Six from: [6]

Data may be invalid although it has been copied correctly e.g. wrong number of characters in
post_code
Data may not have been copied correctly but may be valid e.g. telephone number/area code
copied incorrectly
The stored data on the technician has to be accurate so that decisions based on the data are
appropriate/use of the data is appropriate.

Verification (max 4):


To try and ensure that the data has been copied correctly
…appropriate example: e.g. contact telephone number has been copied correctly
Ensures that data being entered matches/is the same as that obtained from technician
Ensures that the data stored about the technician is more reliable

Validation (max 4):


Carried out by computer so
…only checks that the data is sensible/reasonable/meets pre-set rules
…appropriate example: e.g. gender is either male or female
Does not check that the data is actually correct

10 Six from: [6]

Determine/decide the data to be input into model


…input selected data into model
Decide the parameters that will be used
…input selected parameters into model
Production costs/staffing costs output from model
Prediction of profits output from model
Adjust/amend values for ‘what if’
Use of goal seek/break-even point
Calculate the total costs
Use results to help make decision based on his knowledge of the market
Produce graphical representation of results/data/profits/growth

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 33

11 Eight from: [8]

Sensors collect analogue data about the temperature and pH in the vessel/vat
Data from sensors is converted from analogue to digital using ADC
Microprocessor continuously monitors data from sensors/process is repeated/continues until
fertiliser is made
Microprocessor compares data from temperature sensor with pre-set value
…if temperature in vessel/vat is lower than pre-set value microprocessor sends signal to turn on
heater
…if temperature in vessel/vat is higher than pre-set value microprocessor sends signal to turn off
heater
Microprocessor uses actuators to turn heater on/off
Microprocessor uses actuators to open/close valve
Data from sensors is converted to analogue from digital using DAC
Microprocessor compares data from pH sensor with pre-set value
…if pH in vessel/vat is lower than pre-set value microprocessor sends signal to motor to open
valve to allow in more alkali
…if pH in vat is higher than pre-set value microprocessor sends signal to motor to close valve to
stop flow of alkali

12 (a) Two from: [2]

Primary research is gathering new data that has not been collected before.
Secondary research is the use of existing data that has already been produced.

(b) Six from: [6]

Computer-assisted web-based interviewing (CAWI)


…use on online questionnaires
…automated analysis

Computer-assisted personal interviewing (CAPI)


Either the interviewee or an interviewer sits at a computer terminal
…answers a questionnaire using the keyboard/mouse

Computer-assisted telephone interviewing (CATI)


…telephone survey technique
…the interviewer follows a script provided by software application
…software can choose next question based on previous answer

Automated Computer Telephone Interviewing (ACTI)


…a computer with voice recognition capabilities asks interviewees a series of questions
…recognises and stores the answers
…software follows scripted logic and can branch
…the flow of the questionnaire based on the answers from interviewee
…as well as information known about the interviewee

[Total: 80]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 3 0 9 0 9 5 0 1 1 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (NF/FD) 114998/3
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

Mytoy is a manufacturing company that specialises in making toys for young children.

Mytoy has a number of sales personnel who take orders for toys from shops which they visit.

Each sales person uses a laptop computer which is loaded with word processing software.

When a sales person takes an order from a shop, a large amount of sensitive information such as details
of the shop’s bank account is collected. The sales personnel have social and ethical responsibilities
when collecting this information.

Mytoy have decided to expand its business by selling direct to the public. Members of the public will
be able to telephone their orders to Mytoy’s large call centre. Customers will have the option to leave a
telephone message stating their requirements. Mytoy may ring back or send an email message if that
would be more appropriate.

© UCLES 2016 9713/11/M/J/16


3

1 (a) Describe each of the following portable devices which a sales person could use and for each
one give a different use to which it could be put.

Mobile phone:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DVD player:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Satellite navigation system:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/11/M/J/16 [Turn over


4

(b) Describe three social or ethical implications that the sales personnel should be aware of
when collecting information from the shops.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/11/M/J/16


5

(c) Apart from a word processor, give three other types of application software which you would
expect to be loaded onto each laptop, describing two uses of each. Each use must be
different.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/11/M/J/16 [Turn over


6

2 (a) The call centre system for dealing with customer calls uses third party control with CTI
software on its telephony server. Describe this system and how it would deal with customer
calls.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) (i) Explain why a customer needs to take care before opening an email.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/11/M/J/16


7

(ii) Describe how the customer may be able to tell if there is a potential problem with the
email.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/11/M/J/16 [Turn over


8

Scenario 2

Question 3

Townbank is a community bank.

For many years, the bank has been very successful, but it has recently been losing customers to banks
that offer online banking.

Townbank decide to employ Hardeep, a systems analyst, to oversee the introduction of a new system
to their business.

© UCLES 2016 9713/11/M/J/16


9

3 (a) Hardeep uses the following methods of data collection to research the present situation.
Describe a benefit and a drawback of each method for finding out information in this scenario.

(i) Observation:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Questionnaires:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Interviews:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2016 9713/11/M/J/16 [Turn over


10

(b) Hardeep produces the following system flowchart to describe one of the processes.

Deduct amount
Cheque from customer Store
account transaction
on
customer
Add amount to file
recipient
account

Statement

Describe the uses of the different symbols and explain the process that is represented.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/11/M/J/16


11

(c) Describe how the introduction of online banking:

(i) could affect the working patterns of the bank staff.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) could inconvenience customers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/11/M/J/16 [Turn over


12

Scenario 3

Questions 4 and 5

Webuild is a building company which specialises in building blocks of apartments for people to live in.
Each apartment has a computer-controlled central heating system installed.

Workers are paid weekly. Webuild’s financial department uses a batch processing system to produce
the payroll each week.

Webuild keeps stocks of various building materials in its warehouse. It is Cenko’s job to ensure that
Webuild do not run out of materials. To help her in this task she uses a database. The database contains
a number of files, one of which is the ITEM file and another is the SUPPLIER file.

The NumberInStock of any item varies from 50 to 500.

The Price of any item varies from $20 to $1000.

The MinimumStock of any item varies from 20 to 100.

© UCLES 2016 9713/11/M/J/16


13

4 (a) Explain how the temperature in an apartment is controlled by the computer-controlled central
heating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) (i) Explain why the finance department use a set of sequential files rather than random
access files to produce the payroll.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

© UCLES 2016 9713/11/M/J/16 [Turn over


14

(ii) Describe two problems that may arise because of the use of sequential access files.

1 .......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 .......................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

5 The ITEM file contains the following fields:

Field Name Data Type Example data

ItemName Boiler

NumberInStock 236

Price $499.95

ItemLocation 06:71:03

MinimumStock 100

The SUPPLIER file contains the following fields:

Field Name Data Type

SupplierName

SupplierAddress

SupplierEmail

DiscountOnPrice

OrderPlaced

(a) Complete both tables with the most appropriate data types for each field. For each numeric
field, specify the numeric type. [5]

© UCLES 2016 9713/11/M/J/16


15

(b) In order for the database to work as a relational database at least one more field needs to be
added.
Describe this field and explain why this is necessary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(c) State and describe appropriate validation checks that would be carried out on the ITEM file
data as it is entered. You can describe different validation checks for the same field.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2016 9713/11/M/J/16 [Turn over


16

Scenario 4

Question 6

The government department responsible for education in a particular country is called Edmin.

A group of college teachers has been commissioned by Edmin to produce a detailed report on the
teaching of ICT in colleges. The secretary of the group has been asked to type the first draft of the
report.

The report is to be circulated electronically to members of the group.

© UCLES 2016 9713/11/M/J/16


17

6 Explain how the secretary can allow other members of the group to add comments to the first draft
of the report while maintaining control over the final content.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2016 9713/11/M/J/16


18

BLANK PAGE

© UCLES 2016 9713/11/M/J/16


19

BLANK PAGE

© UCLES 2016 9713/11/M/J/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/11/M/J/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/11


Paper 1 Written A May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

1 (a) [6]

Mobile phone:

A phone that can make/receive calls/messages while the user is on the move
To stay in contact with head office/shops/ to store his appointments/store phone numbers of
shops/colleagues/to phone shop if going to be late for an appointment

DVD player:

A battery powered device that replays DVDs


For watching videos about new products/to show videos of toys to shops/to study training
videos

Satellite navigation system:

A system that pinpoints a user's position/finds the quickest way to a location


To direct salesperson to customer shops/ to allow salesperson to miss traffic holdups so that
appointments are met/to pinpoint the location of a shop

2 marks available for each

(b) Three matched pairs from: [6]

Two from:
Salesperson should have a duty of confidence
Salesperson should sign a confidentiality agreement
Must keep the details of orders confidential
Must not share data collected with any other person or organisation
Must treat the information as confidential/it must be obvious to them that the information is
given in confidence

Two from:
Salesperson should have a duty of fidelity
Must be loyal to Mytoy…
…for as long as they are employed
Must not give information (about new toys/customers) to a rival company
Employee is free to use skills and knowledge acquired from company after they leave them

Two from:
MyToy should anonymise information wherever possible
MyToy should aggregate information wherever possible
Limited amount of information should be collected/transmitted

Two from:
MyToy and its employees must abide by the Data Protection Act
Any 2 examples of a DPA principle

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

(c) Three pairs of answers from: [6]

Database
Two from:
Used to store customer/toy shop data
Used to store customer orders
Salesperson can prepare for visit with knowledge of customer details
Sales/orders can be added to/edited during the course of a visit
Customer details can be added to/edited during the course of the visit
Charts produced showing sales per shop

Spreadsheet
Two from:
When an order is taken the salesperson will use the spreadsheet to calculate the cost of the
order
Can be used to provide an invoice for the customer
Can be used to show trends of customer sales

Web browser
Two from:
Allows the salesperson to show the customer information/images that will answer questions
about toys
Can be used by salesperson to look up customer’s web site to prepare for visit

Email software
Two from:
Allows salesperson to send emails to head office
Can email customer/store to confirm planned visit
Can email customer/store to confirm orders

Presentation software
Two from:
To advertise new products to customers/stores
To show details of all the products to customers/stores
To show potential earnings to customers/stores
To enable salespeople to be kept up to date with training presentations
To create slideshows of products to show customers/shops
To create slideshows to show sales progress to managers

Time management software


Two from:
To organise appointments with customers/stores
To help with daily and weekly planning
Alerts to start of meeting with customer

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

2 (a) Six from: [6]

Each operator has a computer to provide data about the toys


Each operator has a headset to communicate with customer
Each operator’s computer contains a telephony card
Card allows a link to the telephony server
The server directs a call to the appropriate operator
Calls up matching customer records
Displays the script for the operator
Can record conversations/calls with customer
Software enables on-screen phone control such as answer, hang up, hold, conference,
re-dial
Description of IVR (interactive voice response)
Displays caller ids
Queues calls
The operator’s phone communicates directly with the server
The server controls all the phones
The operator’s computer does not control/is not controlled by the phone although it may be
physically connected
Any computer in the system can be used to control any phone
Allow supervisors, for example, to intervene if the call proves too complex for the operator to
handle

(b) (i) Three from: [3]

Emails may contain a virus, including a description of the result


Email may be SPAM, which can alert the sender to the fact it is a valid email address
Email might contain offensive material upsetting the customer
Spyware can be attached to an email

(ii) Three from: [3]

Email could be from an unknown new sender


Emails containing attachments
Attachments could have unusual file extensions…
…e.g. .exe, .bat, .com
Email might contain no subject line
Email address of sender is not the same as normal MyToy email address
Anti-virus software may inform you
If email has been sent to spam/junk folder

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

3 (a) (i) Observation: [2]

Benefit
Enables the systems analyst to see the process as a whole

Drawback
Explanation of the ‘Hawthorne effect’

(ii) Questionnaires: [2]

Benefit
Answers tend to be, on the whole, more accurate/everyone can complete the
questionnaire at the same time instead of one after the other (as with interviews)/can
complete it at their leisure

Drawback
It is very difficult to ask further questions based on the response to another question/can
be anonymous and so may not be taken seriously by user

(iii) Interviews: [2]

Benefit
Interviewer can move away from their ‘script’ and ask a more in-depth question if a
particular response is given/can interpret body language

Drawback
Users have to be available at the time the systems analyst wants to interview them/may
not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to
hear

(b) Six from: [6]

Parallelogram shows input to the system


Rectangles show individual processes
Cylinder shows data that is stored on (magnetic) hard disks
Final symbol represents output/printout
The arrows show the direction of flow of data
The processing of a customer payment

(c) (i) Three from: [3]

May be in danger of losing their jobs


May have to be retrained
Some workers may have to/may have the opportunity to go part time
There may be the opportunity to job share
There may be the opportunity for flexible working hours
There may be the opportunity to work compressed hours
Workers may need to have the ability to move from branch to branch
May change job because technical jobs made available

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

(ii) Three from: [3]

May lose the branch in their town


Might be concerned that hackers might hack into account and transfer funds to own
account
Expense of buying a computer with a broadband internet connection
Unable to make cash deposits or withdraw cash without physically going to the bank or
to an ATM
Reliability of internet connection cannot be guaranteed so may not be able to carry out
transaction
May not like it that the bank is not providing the ‘personal touch’
May mismanage accounts as it is so easy to transfer money from one account to another
Security concerns about data transmitted over internet such as hacking, phishing,
pharming, spyware, viruses, malware
Description of phishing
Description of pharming
Description of viruses

4 (a) Six from: [6]

Required temperature is input using remote control/touchscreen /number pad


Sensor is used to monitor current temperature of the room
Sensor sends reading to the computer
Computer compares temperature from sensor to the pre-set value
If sensor temperature is higher/lower than pre-set value computer sends a signal…
…to the actuator
…if lower computer/actuator switches heater on
…if higher then computer/actuator switches heater off

(b) (i) Four from: [4]

All records will be processed when the payroll is run/no records will be missed
They need to be in same order as master file
Processing time will be reduced
Payroll uses batch processing and sequential files are better suited to batch processing

(ii) Two from: [2]

Individual records may be slower to find


Individual records may take longer to edit
A record can only be replaced if the new record is exactly the same length as the original
Records can only be updated if the data item used to replace the existing data is exactly
the same length

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

5 (a)
Field Name Data Type Example data
ItemName Text Boiler
NumberInStock Integer 236
Price Currency $14.95
ItemLocation Text 06:71:03
MinimumStock Integer 100

Field Name Data Type


SupplierName Text
SupplierAddress Text
SupplierEmail Text
DiscountOnPrice Integer/currency
OrderPlaced Boolean/Date

Five from: [5]

All 5 Text only data types


NumberInStock and MinimumStock set to integer
Price set to Currency
DiscountOnPrice set to integer/currency
OrderPlaced set to Boolean/Yes or No/Date

(b) Four from: [4]

A field that will be common to both the ITEM table and the SUPPLIER table
A field which will contain unique data
Needed to act as the link field between the tables
Acts as the key field in the Item/Supplier table
Acts as foreign key in the Supplier/Item table

(c) Five from: [5]

Type check on NumberinStock: must be numeric


Range check on NumberinStock: between 50 and 500
Type check on Price: must be numeric
Range check on Price: between $20 and $1000
Format check on ItemLocation: Three pairs of digits separated by colons
Length check on ItemLocation: must be 8 characters
Range check on MinimumStock: between 20 and 100
Type check on MinimumStock: must be numeric

© Cambridge International Examinations 2016


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 11

6 Six from: [6]

A system of versions can be used


Editor protects document as tracked changes/comments only
Publishes it online to restricted website/sends it to members
Each member of the group saves their version with a file name/number
Each member must save their version with a different version name/number
Each file name could have the member’s initials appended
Each member uploads file after editing to restricted website/send it to secretary
The secretary can then decide which corrections should be used, if any
Member versions of the report can then be merged to show all suggested amendments from
which the secretary can choose
Tracked changes
…so that the changes can be clearly seen
…and either accepted or rejected
The secretary will be responsible for ensuring that version numbering is maintained (and that
deadlines are met)
Alternatively one file is used
Each member comments on the file and sends it to the next member
Comments can be in a different colour for each member of the group

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/12


Paper 1 Written A May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

1 (a) [6]

Mobile phone:

A phone that can make/receive calls/messages while the user is on the move
To stay in contact with head office/shops/ to store his appointments/store phone numbers of
shops/colleagues/to phone shop if going to be late for an appointment

DVD player:

A battery powered device that replays DVDs


For watching videos about new products/to show videos of toys to shops/to study training
videos

Satellite navigation system:

A system that pinpoints a user's position/finds the quickest way to a location


To direct salesperson to customer shops/ to allow salesperson to miss traffic holdups so that
appointments are met/to pinpoint the location of a shop

2 marks available for each

(b) Three matched pairs from: [6]

Two from:
Salesperson should have a duty of confidence
Salesperson should sign a confidentiality agreement
Must keep the details of orders confidential
Must not share data collected with any other person or organisation
Must treat the information as confidential/it must be obvious to them that the information is
given in confidence

Two from:
Salesperson should have a duty of fidelity
Must be loyal to Mytoy…
…for as long as they are employed
Must not give information (about new toys/customers) to a rival company
Employee is free to use skills and knowledge acquired from company after they leave them

Two from:
MyToy should anonymise information wherever possible
MyToy should aggregate information wherever possible
Limited amount of information should be collected/transmitted

Two from:
MyToy and its employees must abide by the Data Protection Act
Any 2 examples of a DPA principle

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

(c) Three pairs of answers from: [6]

Database
Two from:
Used to store customer/toy shop data
Used to store customer orders
Salesperson can prepare for visit with knowledge of customer details
Sales/orders can be added to/edited during the course of a visit
Customer details can be added to/edited during the course of the visit
Charts produced showing sales per shop

Spreadsheet
Two from:
When an order is taken the salesperson will use the spreadsheet to calculate the cost of the
order
Can be used to provide an invoice for the customer
Can be used to show trends of customer sales

Web browser
Two from:
Allows the salesperson to show the customer information/images that will answer questions
about toys
Can be used by salesperson to look up customer’s web site to prepare for visit

Email software
Two from:
Allows salesperson to send emails to head office
Can email customer/store to confirm planned visit
Can email customer/store to confirm orders

Presentation software
Two from:
To advertise new products to customers/stores
To show details of all the products to customers/stores
To show potential earnings to customers/stores
To enable salespeople to be kept up to date with training presentations
To create slideshows of products to show customers/shops
To create slideshows to show sales progress to managers

Time management software


Two from:
To organise appointments with customers/stores
To help with daily and weekly planning
Alerts to start of meeting with customer

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

2 (a) Six from: [6]

Each operator has a computer to provide data about the toys


Each operator has a headset to communicate with customer
Each operator’s computer contains a telephony card
Card allows a link to the telephony server
The server directs a call to the appropriate operator
Calls up matching customer records
Displays the script for the operator
Can record conversations/calls with customer
Software enables on-screen phone control such as answer, hang up, hold, conference,
re-dial
Description of IVR (interactive voice response)
Displays caller ids
Queues calls
The operator’s phone communicates directly with the server
The server controls all the phones
The operator’s computer does not control/is not controlled by the phone although it may be
physically connected
Any computer in the system can be used to control any phone
Allow supervisors, for example, to intervene if the call proves too complex for the operator to
handle

(b) (i) Three from: [3]

Emails may contain a virus, including a description of the result


Email may be SPAM, which can alert the sender to the fact it is a valid email address
Email might contain offensive material upsetting the customer
Spyware can be attached to an email

(ii) Three from: [3]

Email could be from an unknown new sender


Emails containing attachments
Attachments could have unusual file extensions…
…e.g. .exe, .bat, .com
Email might contain no subject line
Email address of sender is not the same as normal MyToy email address
Anti-virus software may inform you
If email has been sent to spam/junk folder

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

3 (a) (i) Observation: [2]

Benefit
Enables the systems analyst to see the process as a whole

Drawback
Explanation of the ‘Hawthorne effect’

(ii) Questionnaires: [2]

Benefit
Answers tend to be, on the whole, more accurate/everyone can complete the
questionnaire at the same time instead of one after the other (as with interviews)/can
complete it at their leisure

Drawback
It is very difficult to ask further questions based on the response to another question/can
be anonymous and so may not be taken seriously by user

(iii) Interviews: [2]

Benefit
Interviewer can move away from their ‘script’ and ask a more in-depth question if a
particular response is given/can interpret body language

Drawback
Users have to be available at the time the systems analyst wants to interview them/may
not have the time/can take a long time to interview all the users
Interviewees might try and provide answers which they think the interviewer wants to
hear

(b) Six from: [6]

Parallelogram shows input to the system


Rectangles show individual processes
Cylinder shows data that is stored on (magnetic) hard disks
Final symbol represents output/printout
The arrows show the direction of flow of data
The processing of a customer payment

(c) (i) Three from: [3]

May be in danger of losing their jobs


May have to be retrained
Some workers may have to/may have the opportunity to go part time
There may be the opportunity to job share
There may be the opportunity for flexible working hours
There may be the opportunity to work compressed hours
Workers may need to have the ability to move from branch to branch
May change job because technical jobs made available

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

(ii) Three from: [3]

May lose the branch in their town


Might be concerned that hackers might hack into account and transfer funds to own
account
Expense of buying a computer with a broadband internet connection
Unable to make cash deposits or withdraw cash without physically going to the bank or
to an ATM
Reliability of internet connection cannot be guaranteed so may not be able to carry out
transaction
May not like it that the bank is not providing the ‘personal touch’
May mismanage accounts as it is so easy to transfer money from one account to another
Security concerns about data transmitted over internet such as hacking, phishing,
pharming, spyware, viruses, malware
Description of phishing
Description of pharming
Description of viruses

4 (a) Six from: [6]

Required temperature is input using remote control/touchscreen /number pad


Sensor is used to monitor current temperature of the room
Sensor sends reading to the computer
Computer compares temperature from sensor to the pre-set value
If sensor temperature is higher/lower than pre-set value computer sends a signal…
…to the actuator
…if lower computer/actuator switches heater on
…if higher then computer/actuator switches heater off

(b) (i) Four from: [4]

All records will be processed when the payroll is run/no records will be missed
They need to be in same order as master file
Processing time will be reduced
Payroll uses batch processing and sequential files are better suited to batch processing

(ii) Two from: [2]

Individual records may be slower to find


Individual records may take longer to edit
A record can only be replaced if the new record is exactly the same length as the original
Records can only be updated if the data item used to replace the existing data is exactly
the same length

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

5 (a)
Field Name Data Type Example data
ItemName Text Boiler
NumberInStock Integer 236
Price Currency $14.95
ItemLocation Text 06:71:03
MinimumStock Integer 100

Field Name Data Type


SupplierName Text
SupplierAddress Text
SupplierEmail Text
DiscountOnPrice Integer/currency
OrderPlaced Boolean/Date

Five from: [5]

All 5 Text only data types


NumberInStock and MinimumStock set to integer
Price set to Currency
DiscountOnPrice set to integer/currency
OrderPlaced set to Boolean/Yes or No/Date

(b) Four from: [4]

A field that will be common to both the ITEM table and the SUPPLIER table
A field which will contain unique data
Needed to act as the link field between the tables
Acts as the key field in the Item/Supplier table
Acts as foreign key in the Supplier/Item table

(c) Five from: [5]

Type check on NumberinStock: must be numeric


Range check on NumberinStock: between 50 and 500
Type check on Price: must be numeric
Range check on Price: between $20 and $1000
Format check on ItemLocation: Three pairs of digits separated by colons
Length check on ItemLocation: must be 8 characters
Range check on MinimumStock: between 20 and 100
Type check on MinimumStock: must be numeric

© Cambridge International Examinations 2016


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 12

6 Six from: [6]

A system of versions can be used


Editor protects document as tracked changes/comments only
Publishes it online to restricted website/sends it to members
Each member of the group saves their version with a file name/number
Each member must save their version with a different version name/number
Each file name could have the member’s initials appended
Each member uploads file after editing to restricted website/send it to secretary
The secretary can then decide which corrections should be used, if any
Member versions of the report can then be merged to show all suggested amendments from
which the secretary can choose
Tracked changes
…so that the changes can be clearly seen
…and either accepted or rejected
The secretary will be responsible for ensuring that version numbering is maintained (and that
deadlines are met)
Alternatively one file is used
Each member comments on the file and sends it to the next member
Comments can be in a different colour for each member of the group

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 6 2 4 1 0 6 7 5 4 5 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (SG/FD) 126927
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

Mytoy is a manufacturing company that specialises in making toys for young children.

Mytoy has a number of sales personnel who take orders for toys from shops which they visit.

Each sales person uses a laptop computer which is loaded with word processing software.

When a sales person takes an order from a shop, a large amount of sensitive information such as details
of the shop’s bank account is collected. The sales personnel have social and ethical responsibilities
when collecting this information.

Mytoy have decided to expand its business by selling direct to the public. Members of the public will
be able to telephone their orders to Mytoy’s large call centre. Customers will have the option to leave a
telephone message stating their requirements. Mytoy may ring back or send an email message if that
would be more appropriate.

© UCLES 2016 9713/12/M/J/16


3

1 (a) Describe each of the following portable devices which a sales person could use and for each
one give a different use to which it could be put.

Mobile phone:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DVD player:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Satellite navigation system:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/M/J/16 [Turn over


4

(b) Describe three social or ethical implications that the sales personnel should be aware of
when collecting information from the shops.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/M/J/16


5

(c) Apart from a word processor, give three other types of application software which you would
expect to be loaded onto each laptop, describing two uses of each. Each use must be
different.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/M/J/16 [Turn over


6

2 (a) The call centre system for dealing with customer calls uses third party control with CTI
software on its telephony server. Describe this system and how it would deal with customer
calls.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) (i) Explain why a customer needs to take care before opening an email.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/12/M/J/16


7

(ii) Describe how the customer may be able to tell if there is a potential problem with the
email.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/12/M/J/16 [Turn over


8

Scenario 2

Question 3

Townbank is a community bank.

For many years, the bank has been very successful, but it has recently been losing customers to banks
that offer online banking.

Townbank decide to employ Hardeep, a systems analyst, to oversee the introduction of a new system
to their business.

© UCLES 2016 9713/12/M/J/16


9

3 (a) Hardeep uses the following methods of data collection to research the present situation.
Describe a benefit and a drawback of each method for finding out information in this scenario.

(i) Observation:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Questionnaires:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Interviews:

Benefit: ..............................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Drawback: ..........................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2016 9713/12/M/J/16 [Turn over


10

(b) Hardeep produces the following system flowchart to describe one of the processes.

Deduct amount
Cheque from customer Store
account transaction
on
customer
Add amount to file
recipient
account

Statement

Describe the uses of the different symbols and explain the process that is represented.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/M/J/16


11

(c) Describe how the introduction of online banking:

(i) could affect the working patterns of the bank staff.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) could inconvenience customers.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/12/M/J/16 [Turn over


12

Scenario 3

Questions 4 and 5

Webuild is a building company which specialises in building blocks of apartments for people to live in.
Each apartment has a computer-controlled central heating system installed.

Workers are paid weekly. Webuild’s financial department uses a batch processing system to produce
the payroll each week.

Webuild keeps stocks of various building materials in its warehouse. It is Cenko’s job to ensure that
Webuild do not run out of materials. To help her in this task she uses a database. The database contains
a number of files, one of which is the ITEM file and another is the SUPPLIER file.

The NumberInStock of any item varies from 50 to 500.

The Price of any item varies from $20 to $1000.

The MinimumStock of any item varies from 20 to 100.

© UCLES 2016 9713/12/M/J/16


13

4 (a) Explain how the temperature in an apartment is controlled by the computer-controlled central
heating system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) (i) Explain why the finance department use a set of sequential files rather than random
access files to produce the payroll.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

© UCLES 2016 9713/12/M/J/16 [Turn over


14

(ii) Describe two problems that may arise because of the use of sequential access files.

1 .......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 .......................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

5 The ITEM file contains the following fields:

Field Name Data Type Example data

ItemName Boiler

NumberInStock 236

Price $499.95

ItemLocation 06:71:03

MinimumStock 100

The SUPPLIER file contains the following fields:

Field Name Data Type

SupplierName

SupplierAddress

SupplierEmail

DiscountOnPrice

OrderPlaced

(a) Complete both tables with the most appropriate data types for each field. For each numeric
field, specify the numeric type. [5]

© UCLES 2016 9713/12/M/J/16


15

(b) In order for the database to work as a relational database at least one more field needs to be
added.
Describe this field and explain why this is necessary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(c) State and describe appropriate validation checks that would be carried out on the ITEM file
data as it is entered. You can describe different validation checks for the same field.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2016 9713/12/M/J/16 [Turn over


16

Scenario 4

Question 6

The government department responsible for education in a particular country is called Edmin.

A group of college teachers has been commissioned by Edmin to produce a detailed report on the
teaching of ICT in colleges. The secretary of the group has been asked to type the first draft of the
report.

The report is to be circulated electronically to members of the group.

© UCLES 2016 9713/12/M/J/16


17

6 Explain how the secretary can allow other members of the group to add comments to the first draft
of the report while maintaining control over the final content.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2016 9713/12/M/J/16


18

BLANK PAGE

© UCLES 2016 9713/12/M/J/16


19

BLANK PAGE

© UCLES 2016 9713/12/M/J/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/12/M/J/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/13


Paper 1 Written A May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 7 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

1 Six from: [6]

Font style so that documents are obviously from Vegburger


Font colour so that all text matches the same colour scheme
Use a logo on all documents produced
Email address/website/company address/contact details on all documents produced
Name of company on all documents produced
Positioning of items on the document is the same
Use of footer/headers is the same showing corporate information
Use of footers/headers automatically showing usual information

2 (a)
Field Name Data Type
IngredientName Alphanumeric
NumberInStock Integer
Price Currency
UseBy Date
InStock Boolean

Five from: [5]

IngredientName: The items stored will use letters of the alphabet and possibly include
numbers in the name
NumberInStock: Will always be a whole number/no decimals involved/will need to do
calculations on the field
Price: Will be a numeric value with a currency symbol/ will need to do calculations on the
field but result will always need a currency symbol
UseBy: Will always need to be in a date format/to make it easier to identify/can calculate
when a product is out of date
InStock: Only two possible answers, Yes or No

(b) Five from: [5]

Relationship/Entity Relationship diagrams are designed


The types of relationship between the tables decided upon…
....one to many, many to one
INGREDIENT and SUPPLIER files are saved as tables in new database
Field with unique data/key field is created …
…and named SupplierID (or similar name)
SupplierID is included in the SUPPLIER table
SupplierID acts as the key field in the SUPPLIER table
SupplierID field must be added to the INGREDIENT table
SupplierID acts as a foreign key in the INGREDIENT table
Relationships are created/tables are linked…
… using key field/SupplierID

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

3 (a) Four from: [4]

Records will be stored in a particular order


They may need to send out orders for all/many ingredients at the same time
File might need to be in sequential order for batch processing of orders
The records will be held sequentially to allow serial access…
…used to process all records one after the other
After an order is received they may need to update the records of many ingredients at the
same time
Table of indexes is stored
The index enables direct access...
…needed when accessing individual ingredient records quickly
…when supplier queries order regarding a specific ingredient
…when number in stock of a specific ingredient needs finding

(b) Two from: [2]

Serial, where records are processed one at a time


Records stored in chronological order of arrival/Not stored in order of key field/inefficient to
re-sort the entire file every time a new value is added to it

4 (a) Three matched pairs from: [6]

Sensors used to input values from experiments e.g. temperature sensor when experimenting
with hot liquids
Safer than student doing this in hazardous situation/will take readings more
regularly/accurately

Touch screen to choose simulation of an experiment/science lesson


More resistant to liquids than a keyboard

Microphone dictate experiment methodology/results


Allows student to record experiment methodology/results while carrying out experiment

Digital cameras to take photo/video of experiments


To include real images in word processed report so do not have to draw experiment
equipment

(b) Four from: [4]

Have a CO2 fire extinguisher in the room


Don’t overload sockets/make sure there are enough sockets in the room
Use LCD monitors
Have adequate ventilation/don’t place computers too close together/make sure ventilation
holes are not blocked
Ensure wires are properly insulated
Do not take food and water near to computers
Ensure adequate trunking is in place /Place cables under carpet/use WiFi devices
Cabling should be tied up/organised
Place heavy equipment in middle of work surface/use appropriate support structures on
tables/computer equipment must be securely fitted/benching/work desks should be sturdy
enough to take the weight of heavy equipment/do not allow heavy equipment to overhang

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

Only allow qualified electricians to install/regularly check electrical equipment


Equipment should be checked regularly
Electrical equipment must be located away from water supplies

(c) Three matched pairs from: [6]

Data shall be accurate and up to date


So Rose knows that reasonable steps have been taken to ensure the accuracy of the
information/can know when her details change these will be recorded

Data shall be processed fairly and lawfully


Data will not be used in ways that have harmful effects on Rose/ data will be handled in ways
she would reasonably expect

Data held shall be adequate and relevant for the purpose though not excessive
To protect Rose in that the data held is sufficient for the purpose it is being held for/a greater
amount of information than needed for the purpose is not being held

Data will not be kept for longer than necessary


Information that is no longer needed for the purpose is deleted/information if it goes out of
date is updated/archived/securely deleted information if it goes out of date

Data will be kept secure


To make sure there is the right physical and technical security/the college is ready to
respond to any breach of security swiftly and effectively

Data will be processed for limited purposes


So that data collected for one purpose is not used for any purpose that is not compatible with
the original one

Processed in accordance with the individual’s rights


So Rose can ask – for a description of the personal data/the reasons it is being
processed/whether it will be given to any other organisations or people

Not transferred to countries outside that country unless it has adequate protection for the
individual interests of the individual or another person
So Rose is not exposed to more liberal interpretation of data protection

5 Six from: [6]

Attach files to email messages so that students can send their work
Compress files so that large files like videos of experiments can be sent
Use of anti-virus software to check attachments
Use CC to allow student to send same message to other students
Use BCC to allow a copy to be sent to a teacher without the other members of the group knowing
Use forward to allow work received to be sent on to others
Use groups so that the student could write the name of the group and the message is sent to all
in the group/how to send emails to groups/set up groups

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

6 (a) Five from: [5]

Represents the processing of the customer requirements

Invoice

Represents where the customer invoices are output/stored

Order of cream

Represents where the orders are output/stored

Represents the customer making the order

Represents the direction of the flow of data

Diagram represents the flow of data through the Creamclot ordering system

(b) Four matched pairs from: [8]

Design of data collection forms/screen layouts…


…so that data is collected accurately

Design of report layouts/screen displays…


…to present information clearly

Design of validation routines…


…to ensure that data entered into the system is sensible

Design of the necessary data and file structures…


…to ensure that data input/output/processing are carried out efficiently

Design the program specification…


…so that the programmer is given guidance to write the software

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

(c) Four matched pairs from: [8]

Text editor allows typing and editing of plain text…


…can be used to produce html necessary for company website

Database used to store data in an organised way…


… can be used to store data about orders/search for unpaid invoices

Spreadsheet to allow for easy data entry and manipulation of numbers…


…allows calculation of invoices/discounts

Presentation authoring software allows multimedia presentations to be created…


…can be used to create the presentation about cream to be placed on the website

Computer language is used to write software…


…used by programmer to write the programs that will process the orders

System software to control the hardware…


…a printer driver to allow the printers to print invoices/disc operating system to save invoices
etc.

Word processing software allows typing, editing and formatting of text…


…to produce orders/invoices for customers

7 (a) (i) Tape only allows records to be read one after the other/serially [1]

(ii) The read/write head can access records in any order [1]

(b) Five from: [5]

Advantages of sequential filing system:


Easier to understand for programmers to write software for
Easier to manage/maintain (the file)

Disadvantages of sequential storage:


Entire file has to be processed
Amendments can be more difficult to make
Transactions might need to be sorted in a particular sequence before processing
Slower to find a particular record
The only way to add new records to a sequential file is to store them at the end of the file

Advantages of random access:


Allows changes to be made more quickly to any record
Faster access of the desired records
Allows worker’s queries to be answered more quickly
Payroll system does not require additional hardware whereas sequential access system will
require additional tape storage
No sorting of the records is required (only if not given in sequential disadvantage)

Disadvantages of random access:


Data may be accidentally erased or over-written unless special precautions are taken
More expensive as hard disks are needed to store the records

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – May/June 2016 9713 13

8 (a) Six from: [6]

Microprocessor receives data from temperature sensor


Analogue data from the sensor converted to digital using an ADC
Required temperature is entered using touchscreen/number pad/remote control
Microprocessor compares the room temperature with the required temperature
If room temperature is lower/greater than required temperature the microprocessor sends a
signal…
…to the actuator
If room temperature is greater than required temperature the microprocessor/actuator
switches the fan on/speeds up the fan
If room temperature is lower than required temperature the microprocessor/actuator switches
the fan off/slows down the fan

(b) Two from: [2]

Different guests will want different/to change temperatures…


…without each room having a separate means of inputting required temperature it’s
impossible to achieve
Some rooms need to have different temperatures to others…
…work areas like kitchens need lower temperatures
…indoor swimming pool area will need a higher temperature

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 3 6 6 3 3 5 6 7 0 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (NF/FD) 114999/3
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2 and 3

Vegburger is a chain of fast-food restaurants. The management of the chain has decided that it is
necessary to update its image.

As part of the update it has been decided to rebrand all stationery used by the chain. A master
document using a corporate house style is to be designed from which all hard copy communications
will be printed.

Vegburger keep stocks of various ingredients for the food used in the restaurants, in their warehouse.
It is Li’s job to ensure that the warehouse does not run out of ingredients. To help her in this task she
uses two files, one of which is the INGREDIENT file and the other is the SUPPLIER file.

Li stores alterations to the files on a transaction file which she uses to update the other two files at
the end of each day. After updating the files the INGREDIENT file is printed in alphabetic order of
IngredientName. Sometimes Li needs to find the details about a particular ingredient quickly.

© UCLES 2016 9713/13/M/J/16


3

1 Describe the features of the master document that would help project the corporate image.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2016 9713/13/M/J/16 [Turn over


4

2 (a) The INGREDIENT file contains the following fields.

Field Name Data Type


IngredientName Alphanumeric
NumberInStock Integer
Price Currency
UseBy Date
InStock Boolean

Give a reason for the choice of data type for each of the fields.

IngredientName:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

NumberInStock:
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Price:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

UseBy:
...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

InStock:
...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2016 9713/13/M/J/16


5

(b) Li wishes to use the INGREDIENT and SUPPLIER files to find the contact details of the
supplier for a specific ingredient.

Describe how the files can be used to create a relational database which would enable her to
do this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

3 (a) Explain why the INGREDIENT file is stored as an indexed sequential file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2016 9713/13/M/J/16 [Turn over


6

(b) Describe the type of file access the transaction file uses and give a reason for your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2016 9713/13/M/J/16


7

Scenario 2

Questions 4 and 5

Rose is a teacher in a college. She specialises in teaching science. The students in her classes use
computers, each with a keyboard and a mouse.

Rose needs to be aware of safety issues when her students are using computers in the science
laboratory.

As part of her job, it is necessary for Rose to store a large amount of personal data about her students.
In addition, the college authorities store data about Rose. Both Rose and the college authorities are
covered by the data protection legislation in the country.

Rose needs to teach her students to use email so that they can communicate with teachers and other
students when doing project work at home.

© UCLES 2016 9713/13/M/J/16 [Turn over


8

4 (a) Apart from a keyboard and mouse, describe other input devices which Rose could encourage
her students to use in their science lessons and for each one give a reason why it would be
used.

Each reason must be different.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Describe four measures that Rose could take to minimise safety issues in the science
laboratory when her students are using computers.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2016 9713/13/M/J/16


9

(c) Describe three principles that could be included in the data protection legislation and for each
one explain why it is necessary.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/13/M/J/16 [Turn over


10

5 Rose’s students already know how to send and receive emails.

Describe other ICT skills that her students should understand in order to be able to use email
appropriately.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2016 9713/13/M/J/16


11

Scenario 3

Questions 6 and 7

Creamclot is a small company that produces cream for sale through a number of shops in local towns.

Jose, the manager of Creamclot, wants to expand the business countrywide.

Jose has employed Juanita, a systems analyst, to oversee the introduction of the new system. Juanita
has decided that customers will telephone their orders to the company.

© UCLES 2016 9713/13/M/J/16 [Turn over


12

6 (a) Juanita has produced a level 0 DFD for the new system.

Order and
Customers Order of cream
invoice sent

Order details
Order phoned
Order processed

Invoice

With reference to the symbols and the labelling explain what the diagram represents.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2016 9713/13/M/J/16


13

(b) Before creating the new system, Juanita will need to design it. One element of the design will
be specifying the required hardware and software.
Describe four other sections that will be found in the design and for each one explain why it is
necessary.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2016 9713/13/M/J/16 [Turn over


14

(c) Describe four different types of software which would be used to produce different aspects of
the new system. For each one state what it would be used for.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2016 9713/13/M/J/16


15

7 Creamclot’s management have decided to computerise the payroll system. A choice needs to be
made between using a sequential filing system and a random access filing system for producing
the payroll.

(a) (i) Explain why magnetic tape is used for a sequential filing system.

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [1]

(ii) Explain why hard disk storage is used for a random access filing system.

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [1]

(b) Explain the advantages and disadvantages to Creamclot of using each of these systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2016 9713/13/M/J/16 [Turn over


16

Scenario 4

Question 8

The Seaside hotel company owns hotels at many resorts along the coast. Because many of the rooms
face the sun they can get very hot during the summer.

Each hotel room has an air conditioning system which is controllable by the guest who is staying in the
room. The guest sets the temperature that they require. Each air conditioning unit is microprocessor
controlled.

Enrico is the manager of one of the hotels. He decides to try to save money on the electricity bill. He
plans to set the temperature for the whole hotel centrally so that guest rooms are always at the same
temperature. The system will be controlled by a computer.

© UCLES 2016 9713/13/M/J/16


17

8 (a) Explain how each room’s air conditioning system maintains the required temperature.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Describe the problems that could arise with maintaining a single temperature for the whole
hotel centrally.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2016 9713/13/M/J/16


18

BLANK PAGE

© UCLES 2016 9713/13/M/J/16


19

BLANK PAGE

© UCLES 2016 9713/13/M/J/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/13/M/J/16


Cambridge International Examinations
Cambridge International Advanced Level
* 5 4 3 1 4 1 3 5 0 0 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 May/June 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

DC (RW/CGW) 126908/3 R
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2, 3, 4, 5, 6 and 7

A2Z is a company which specialises in developing new drugs for treating human illnesses.
They use a supercomputer in their research.

Daniel works as a publisher for the company and produces a monthly magazine.

The magazine contains articles about the research being carried out both in the laboratories and at
research sites around the world.

Daniel employs a number of reporters to write the articles for the magazine. The reporters are expected
to gather information from the scientists.

The reporters are provided with a laptop.

Articles may be produced in the offices or while travelling but have to be sent to Daniel in time for
publication in both hardcopy and electronic formats.

© UCLES 2016 9713/31/M/J/16


3

1 Give reasons why a reporter would use each of these input devices when preparing their articles.

(i) A4 scanner

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(ii) microphone

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

2 Describe the limitations of using a laptop for creating an article and sending it to Daniel.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/31/M/J/16 [Turn over


4

3 The resources gathered by the reporters are used by Daniel to produce the article as an automated
document.
Describe how Daniel would do this.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

4 The company prints the magazine using ‘computerised-plate making’.


Describe the printing process, including the use of ‘computerised-plate making’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/31/M/J/16


5

5 The company decides to produce an electronic version of the magazine.


Discuss the benefits and drawbacks of producing the magazine in electronic format.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/31/M/J/16 [Turn over


6

6 A reporter, Victoria, wants to gather information by interviewing some of the scientists by telephone.
Victoria will also use email to ask questions of other scientists.

(a) Discuss the benefits and drawbacks of telephone interviewing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/M/J/16


7

(b) Discuss the advantages and disadvantages of using email rather than face-to-face interviewing
to gather information from the scientists.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/M/J/16 [Turn over


8

7 (a) Describe what is meant by the term ‘supercomputer’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe how supercomputers are used in drug research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/31/M/J/16


9

BLANK PAGE

© UCLES 2016 9713/31/M/J/16 [Turn over


10

Scenario 2

Questions 8 and 9

SRCo is a scientific research company that employs a number of skilled technicians to support the
scientists in its laboratories. The technicians may work in more than one laboratory depending on the
needs of the scientists.

The company has a human resources department that keeps a database. The database stores details
of the technicians. The human resources department issues each technician with an identity badge.

Jasmine works in the human resources department where her job is to create a new record in the
database and issue a badge to a technician when they join the company.

© UCLES 2016 9713/31/M/J/16


11

8 (a) Explain why Jasmine would need to use each of the input devices below when she creates a
new record in the database.

(i) digital camera

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) keyboard

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(b) (i) When a database is created, the fields in the database are usually assigned a data type.
Explain why it is necessary to assign a data type to a field.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/31/M/J/16 [Turn over


12

(ii) The details of each technician are stored in fields in the database. For each of the fields
shown, complete the table to give the most appropriate data type and a reason for
using that type.

Details stored in the Most appropriate data type Reason for using the
field in the database used for that field chosen type

Technician’s last
name

Technician’s gender

[2]

(iii) Explain why it is not appropriate to use a ‘numeric’ data type for the field in the database
that stores the telephone number of the technician.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/31/M/J/16


13

9 Part of the database used by the human resources department is shown in the diagram below.

7HFKQLFLDQ -RE5ROH -RE7LWOH


technician_ID technician_ID title_ID
first_name date_start title_name
last_name title_ID job_description
gender Lab_ID
address
city
post_code /DERUDWRU\
telephone_number Lab_ID
Lab_name
Scientist_ID

(a) Explain why the human resources department uses a relational database rather than a flat
file database for storing the technician details.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/31/M/J/16 [Turn over


14

(b) Explain the relationship between the Technician table and the JobRole table.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(c) Explain the relationship between the JobRole and the JobTitle table.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) When Jasmine enters the details of a newly employed technician, the details are verified and
validated. Explain, with examples from the database, why both validation and verification of
the details are necessary.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/M/J/16


15

BLANK PAGE

© UCLES 2016 9713/31/M/J/16 [Turn over


16

Scenario 3

Questions 10, 11 and 12

KemCo is a chemical company that develops, manufactures and markets fertilizers for growing crops.

Colin, the marketing manager, uses computer-based financial models to assess whether or not the
company should develop, manufacture and market a new fertilizer.

The manufacturing process of the fertilizer is monitored and controlled by microprocessors.

Once the fertilizer is ready to sell, Colin uses primary and secondary marketing techniques to help him
market the fertilizer.

© UCLES 2016 9713/31/M/J/16


17

10 Describe how Colin could use a financial model to assess whether or not it would be profitable to
produce a new fertilizer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/31/M/J/16 [Turn over


18

11 The fertilizer manufacturing process is dependent on temperature and pH. Alkali is used to raise
the pH of the fertilizer in the vessel. A diagram of the process is shown below. A microprocessor is
connected to the sensors, valve and heater.

Hopper with alkali

Valve to let in more alkali


Microprocessor

Vessel with
Temperature fertilizer
sensor

pH sensor
Heater

Describe how the microprocessor controls the conditions in the vessel.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2016 9713/31/M/J/16


19

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

Question 12 is on the next page.

© UCLES 2016 9713/31/M/J/16 [Turn over


20

12 (a) Explain the differences between primary and secondary research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe how Colin could use computer-based research techniques to carry out primary
research.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/31/M/J/16


Cambridge International Examinations
Cambridge International Advanced Level

APPLIED INFORMATION & COMMUNICATION TECHNOLOGY 9713/31


Paper 3 Written B May/June 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2016 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 7 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

1 (i) Two from: [2]

Original source is only available in hardcopy


…may need to use software to edit the digital copy of the source
…may contain text that may be imported into article using OCR

(ii) Two from: [2]

…dictate article for future typing


…record a voice memo/audio log about the article
…use of speech-to-text/speech recognition
…to record interviews for use in the article

2 Four limitations of laptops from: [4]

Difficulties when viewing/creating the article on laptops which generally have smaller screens and
keyboards presenting
Image processing can be slower on laptops which usually have lower specification/ slower
processors / less memory (RAM)/ smaller hard drive with slower access times for the same cost
as e.g. desktop computer
Laptops are inherently more vulnerable to damage and theft so more risk of loss of article
Power management issues e.g. limited battery life so more difficult to manage when away from
office
Connecting to outside networks may require configuration skills/more technical skill to connect
when away from office
Repairs are more difficult than when away from office/traveling

3 Four from: [4]

Ensure resources are all electronic


Gather assets/resources into common/shared area
Convert assets/resources into suitable format for inclusion into final document
Create master document/template
Use of copy/paste of resources into master document
Use of hyperlinks embedded in the master document/template
Use of embedded object linking to include remotely stored assets/resources

4 Four from: [4]

Text and images/assets are brought together


Media/plate held in precise position
Plate wrapped around drum rotating on its axis/plate is put in cylinder and head move long axis/
plate on flat bed and laser is deflected by mirrors line by line
Computer data used to control the laser/ultraviolet to produce image on plate/drum
Separate plates are created for different colours
Plate/drum uses to print onto paper

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

5 Four from: [4]

Benefits:
Reduction in time taken from conception to publication
Storage space for the product/assets is virtually unlimited
Fewer overheads e.g. distribution costs means lower cost of production
Distribution of electronic publications is faster than printed/hardcopy
Can include links/multimedia to illustrate/enhance the content

Drawbacks:
Different formats exist so magazine has to be made available in several formats
Content is not secure compared to printed format/content can be copied more easily
Perceived lack of ‘quality’ in electronic publications

6 (a) Six from: [6]

Benefits:
There is no significant time delay between question and answer
Interviewer can more easily ask extension questions based on answers
…that can add to the verbal answer from the interviewee/scientist
People from all over the globe can be interviewed
Enables interviewers/reporters to contact people in restricted areas e.g. laboratories for
medical research
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview can easily be recorded for later transcription/reference

Drawbacks:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Telephone line quality can affect responses
Easier for interviewee/scientist to find excuse/make up excuse/find reasons to terminate the
interview

Max 4 for all benefits or all drawbacks

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

(b) Six from: [6]

Advantages:
Can interview scientists that are not easy to access e.g. in restricted areas
Easier to ask lengthy questions that require a detailed response
Can use emoticons
The lack of nonverbal and social cues can reduce miscommunication due to cultural diversity
Reporter/scientist has some degree of anonymity so reporter may get more information from
scientist
Reporter has time to formulate questions/scientist has time to construct reply
No need to travel/no travel costs for reporter
No time wasted by reporter in travelling to interview
Interview dialogue/exchange/emails easily kept for reference
Can use translating tools to interview in different/foreign languages

Disadvantages:
The reduction of social cues/cannot see interviewee so e.g. body language/eye contact
cannot be used as a source of extra information
The interviewer has no knowledge of the situation in which the interviewee is situated
…so less able to create a good interview ambience
Reporter has to adapt to email style of scientist
Reporter has to wait for reply which might be a long time
Scientist may never reply/may terminate the contact without notice
Reporter may have to send reminders

Max 4 for all benefits or all drawbacks.

7 (a) Two from: [2]

Very large number of processors/multi-core processors running in parallel


Processors close together in a ‘computer cluster’
Processors can be distributed across a network/the ‘cloud’
Can process trillions of operations per second
Can run different operating systems on different nodes/processors in cluster

(b) Four from: [4]

Computer can be used to scan/search through databases of molecules/chemicals/drugs to


find chemical compounds that could be used as basis for new drugs
Computer can be used to scan/search through databases of human genome for possible
new drug treatments for e.g. cancer
Computer used to cross-match results of previous research with results of new drug under
development
Computer can be used to create/run a model of the effects of the drugs/chemicals on
subject/human body
Computer can be used to predict the effects/possible side effects of the new drug
Computer can be used to monitor amount of chemicals/ingredients being used

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

8 (a) (i) One from: [1]

Needed to take photograph of employee/technician for use on ID card/to store in


employee/staff database

(ii) One from: [1]

Needed to type/enter characters to input details of new technician into the database

(b) (i) Two from: [2]

…not practical to have the computer spend time processing the data to determine how
best to store it
Allows validation rules to be easily applied to the data
…determines/places constraints on the values that are possible in a field
…to ensure the integrity of the data
Makes it easier to determine other properties of the field
…e.g. format of data within the field/maximum size of a field value/use of the field data in
expressions/ whether or not the field can be indexed/size of the database
Allows use of storage space to be optimised

(ii) Two from (one mark for a matching data type and a valid reason): [2]

Details stored in Most appropriate Reason for using


the field in the data type used for the chosen type
database that field
Name can contain
Technician’s last
Text/character/ almost any
name
alphanumeric/ string printable character
Technician’s Boolean Only two choices
gender

(iii) One explanation from (max 2 marks per explanation): [2]

Telephone numbers may contain spaces; spaces are not numbers so could not be
entered
Telephone numbers may contain letters, letters are not numbers so could not be entered
There is no need/requirement for mathematical calculations on telephone numbers
Some telephone numbers have a leading zero which makes it text
Some telephone numbers have a leading plus/+ which makes it text

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

9 (a) Four from: [4]

Data is stored only once/one record per technician/avoids data duplication so less storage
space is needed
Data is stored only once/one record per technician no need to update multiple
records/deletion or modification of data is simpler/quicker
…changes are cascaded to other tables
Complex queries can be carried out by extracting data from multiple tables
Enhanced security access to tables can be restricted on individual table basis
Database can be expanded easier than a flat file database by adding new tables and
creating new links
Ensures referential data integrity

(b) One-to-many because each technician has more than job role [1]

(c) one-to-one each job role has only one title [1]

(d) Six from: [6]

Data may be invalid although it has been copied correctly e.g. wrong number of characters in
post_code
Data may not have been copied correctly but may be valid e.g. telephone number/area code
copied incorrectly
The stored data on the technician has to be accurate so that decisions based on the data are
appropriate/use of the data is appropriate.

Verification (max 4):


To try and ensure that the data has been copied correctly
…appropriate example: e.g. contact telephone number has been copied correctly
Ensures that data being entered matches/is the same as that obtained from technician
Ensures that the data stored about the technician is more reliable

Validation (max 4):


Carried out by computer so
…only checks that the data is sensible/reasonable/meets pre-set rules
…appropriate example: e.g. gender is either male or female
Does not check that the data is actually correct

10 Six from: [6]

Determine/decide the data to be input into model


…input selected data into model
Decide the parameters that will be used
…input selected parameters into model
Production costs/staffing costs output from model
Prediction of profits output from model
Adjust/amend values for ‘what if’
Use of goal seek/break-even point
Calculate the total costs
Use results to help make decision based on his knowledge of the market
Produce graphical representation of results/data/profits/growth

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International A Level – May/June 2016 9713 31

11 Eight from: [8]

Sensors collect analogue data about the temperature and pH in the vessel/vat
Data from sensors is converted from analogue to digital using ADC
Microprocessor continuously monitors data from sensors/process is repeated/continues until
fertiliser is made
Microprocessor compares data from temperature sensor with pre-set value
…if temperature in vessel/vat is lower than pre-set value microprocessor sends signal to turn on
heater
…if temperature in vessel/vat is higher than pre-set value microprocessor sends signal to turn off
heater
Microprocessor uses actuators to turn heater on/off
Microprocessor uses actuators to open/close valve
Data from sensors is converted to analogue from digital using DAC
Microprocessor compares data from pH sensor with pre-set value
…if pH in vessel/vat is lower than pre-set value microprocessor sends signal to motor to open
valve to allow in more alkali
…if pH in vat is higher than pre-set value microprocessor sends signal to motor to close valve to
stop flow of alkali

12 (a) Two from: [2]

Primary research is gathering new data that has not been collected before.
Secondary research is the use of existing data that has already been produced.

(b) Six from: [6]

Computer-assisted web-based interviewing (CAWI)


…use on online questionnaires
…automated analysis

Computer-assisted personal interviewing (CAPI)


Either the interviewee or an interviewer sits at a computer terminal
…answers a questionnaire using the keyboard/mouse

Computer-assisted telephone interviewing (CATI)


…telephone survey technique
…the interviewer follows a script provided by software application
…software can choose next question based on previous answer

Automated Computer Telephone Interviewing (ACTI)


…a computer with voice recognition capabilities asks interviewees a series of questions
…recognises and stores the answers
…software follows scripted logic and can branch
…the flow of the questionnaire based on the answers from interviewee
…as well as information known about the interviewee

[Total: 80]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Level
* 1 3 0 2 5 8 7 7 0 3 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 February/March 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NH) 113352/2
© UCLES 2016 [Turn over
2

Scenario 1
Questions 1 and 2

NatKorp is a multinational company with offices in cities around the world.

The staff in the offices are in regular contact with each other by email and telephone in order to share
and discuss company business.

The staff can use the company network for remote storage of files, for access to the World Wide Web
and for use with telephone handsets that use VoIP.

Each member of staff is provided with a company email address. The address is based on the name of
the member of staff and the name of the company.

© UCLES 2016 9713/32/F/M/16


3

1 (a) Discuss the benefits and drawbacks of using VoIP for voice calls.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Explain how VoIP software enables company staff to talk to each other.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]
© UCLES 2016 9713/32/F/M/16 [Turn over
4

2 Sanjit, a sales manager, uses the company email and has this email address:

sanjit.sales@company.com
 

A B
(a) Describe the purpose of the parts of an email address. You may use the labels A and B to
help you.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/F/M/16


5

(b) Describe, in detail, how an email is sent by Sanjit and delivered to a sales representative in
another office.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/32/F/M/16 [Turn over


6

Scenario 2
Questions 3, 4 and 5

The authorities at an international airport have introduced a range of measures to try and improve the
process of identifying passengers and improve the security of the airport and aircraft.

The airport now requires all passengers to use electronic tickets (e-tickets) and to use an electronic
passport (e-passport) containing an embedded chip which holds the personal details of the passenger.

Some airlines send boarding passes to the passenger’s mobile phone. They often refer to this as a
mobile boarding pass.

© UCLES 2016 9713/32/F/M/16


7

3 (a) Explain the benefits to the passenger of using e-tickets.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe how the airport computer system is used to match an e-ticket to a specific passenger
at check-in.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/F/M/16 [Turn over


8

(c) State one way that a boarding pass may be sent to the mobile device of a passenger.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) (i) Describe the benefits of using mobile boarding passes.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe one drawback of using mobile boarding passes.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

4 E-tickets have to be purchased online. Explain why passengers may be worried about purchasing
e-tickets online.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/32/F/M/16


9

5 Discuss the benefits and drawbacks of the airport requiring all passengers to use an electronic
passport.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/F/M/16 [Turn over


10

Scenario 3
Questions 6, 7 and 8

A supermarket buys the goods that it sells, from a wholesaler who keeps goods in a warehouse ready
for delivery to the supermarket when they are needed.

The supermarket uses point of sale (POS) terminals at its checkouts.

Operators of the POS terminals use a variety of hardware devices to enter data about the goods being
sold.

The supermarket has a stock control database containing details of all the goods that it sells. The stock
control database is linked to the computer system at the wholesaler’s warehouse.

The supermarket uses a ‘just-in-time’ (JIT) strategy to ensure that it always has enough goods to sell to
its customers.

© UCLES 2016 9713/32/F/M/16


11

6 (a) Give the advantages and disadvantages of a checkout operator using each of the following
items of hardware at a POS terminal.

(i) barcode reader ..................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) electronic scales ................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(iii) numeric keypad .................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(iv) touch screen ......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]
© UCLES 2016 9713/32/F/M/16 [Turn over
12

(b) Describe, in detail, the computer processing that occurs to ensure that goods are re-ordered
to replace those sold.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/32/F/M/16


13

7 Discuss the advantages and disadvantages of using a JIT strategy.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/F/M/16 [Turn over


14

8 The supermarket is considering replacing its ‘off-the-shelf’ database software with purpose-written
(bespoke) stock control software.

Explain the benefits and drawbacks of using purpose-written (bespoke) software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/F/M/16


15

BLANK PAGE

© UCLES 2016 9713/32/F/M/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/32/F/M/16


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the March 2016 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/32 Paper 3 (Written Test B), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the March 2016 series for most Cambridge IGCSE®
and Cambridge International A and AS Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

1 (a) Six from:

Benefits:

No direct calling costs when using VoIP handsets over company network
Can be used from smartphone/PC and tablets
Can support additional services e.g. Caller ID, anonymous call blocking, call diversion, call
waiting, do not disturb, ring back, voicemail
Can support encryption of conversations
Can support telephone conferences/more than two participants
Easily expandable compared to traditional telephone networks
Staff can have location independent telephone numbers which are assigned so staff login to
services

Drawbacks:

Can use too much network resource/bandwidth


Data packets can be lost
Data packets can arrive in the wrong order/need to be re-sequenced
Quality of service can vary/put demands on the network to the detriment of other uses
Latency can be a problem – delay in sound/voices
…caused by e.g. packets taking different routes
Latency deliberately increased to counter jitter – packets buffered to re-sequence so jitter is
introduced
Calls can be intercepted more easily than traditional calls so increased need for encryption
Support for emergency calls depends on power to the VoIP system being on

Max 4 for all advantages or all disadvantages.


1 mark is available for a reasoned conclusion [6]

(b) Six from:

Signal sent from one handset to system to locate/connect to appropriate receiving


handset/initiate connection
Telephone handset/headset uses microphone to capture voice/sounds
Analogue sounds/voices are digitised
…using codec
Digital information divided into packets
Packets placed into IP packets
…using UDP as no re-transmission of packets is usually possible due to latency
Packets transmitted over network
…packet switching
Packets travel independently
Receiver re-sequences packets
Digital data converted back to analogue
…using codec
Use of session control/signal protocols
…to set up/end calls [6]

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

2 (a) Four from:

A: local address
…used to identify holder of email inbox/used as username of the holder of email inbox

B: domain part of address


…identifies administrative body e.g. the company that owns the address
…used in routing the email to correct address
…looked up against DNS records
…last part can be used to identify the type of company e.g. .com represents a commercial
organisation/is a top level domain

@: used to separate local from domain address

Account name cannot be longer than 64 characters and domain name cannot be, practically,
longer than 254 characters. [4]

(b) Six from:

Email written in email client/software/webmail…


…add any required attachments
Subject added to subject bar
Address added to email…
…cc/bcc other recipients
Sets read receipt if required
Email sent to outbox
Use of SMTP/POP3/IMAP protocol(s)
Outbox sends email to email server on network
Email server stores email ready for forwarding
Email server uses domain part of email to look up domain of recipient
Email server send sends email to appropriate domain via routers
…each router uses IP address of domain to direct packets/email
Email arrives at server of domain and may be stored
…recipient server looks up local address
…sends email to inbox of recipient/local address [6]

3 (a) Four from:

No waiting for delivery


E-ticket cannot be lost/misplaced/damaged
…E-ticket can be reprinted
Less prone to fraud/ e-ticket cannot easily be used by others
Can be used by displaying on smart-phone
…no need to print anything at all
Can carry a barcode/matrix/QR code is all that is needed/contains link to all booking details
Passenger details stored in system so can be retrieved for future use
Physical copy of e-ticket may not actually be required/no need to have physical copy at
check-in
…passenger may just need reference code and personal/photo id
Allows check-in online
…enables selection of seats
Allows boarding passes to be printed before arrival at check-in/airport
…reduces delays at airport check-in desks [4]

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

(b) Four from:

Unique barcode/matrix code on ticket/in email body/attachment


…used to look up passenger details…
…passenger details already stored on system when booking was made
…credit card/passport number/email address
Details checked with passenger identification documents
…passenger shows credit card used to purchase tickets/passport [4]

(c) One from:

Sent by email on check-in


Sent by text message on check-in
Use of airline app/the boarding pass appears within airline app on check-in [1]

(d) (i) Two from:

No need to stop at a kiosk at the airport to print boarding pass


No need to use paper/environmentally friendly due to reduced paper use
May be more secure due to use of matrix codes/no paper copy
Passengers may not have access to a printer [2]

(ii) One from:

Mobile app may not cope with more than one per person per reservation
Mobile device may not work/battery may fail on device
E-boarding pass may not be readable from the screen of the device [1]

4 Four from:

More possibility of fraud


…personal details can be intercepted during transfer between passenger and booking site
…personal details can be used for identity theft
…financial details can be intercepted during transfer between passenger and booking site
…financial details can be used to purchase goods by third parties
…financial details can be used to transfer/steal funds from bank accounts of passengers
Correction of errors on application form for e-ticket may be expensive to correct [4]

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

5 Eight from:

Benefits:

Very secure so passport copying/tampering is more difficult


…chip holds hash (#) code of all files so copying/tampering is difficult
Faster clearance at immigration checks
…chip is read/checked quicker by a computer than by a human
Automated border clearance at border posts
…fewer border staff required at checkpoints
…greater border protection

Drawbacks:

Data transfer by RFID is insecure


…can be read by any appropriate reader in vicinity
Electronic passports are more expensive for passenger to buy
Extra cost of readers at airports/check-ins
Use of biometric data is seen as an invasion of privacy

Max 6 for all benefits or all drawbacks


One mark is available for a reasoned conclusion. [8]

6 (a) (i) Three from e.g. :

Advantages:

All items/goods have a barcode


…reader is required to scan barcodes on items which is quicker than manual entry
…as item is purchased
…to look up item details for customer which is quicker than manual lookup
No need to manually type in item details
…so there are fewer data entry errors at checkout/by operator

Disadvantages:

Barcode may be unreadable due to damage/missing


Item may not be in stock database/may be incorrectly entered in stock database

Max 2 for all advantages or all disadvantages [3]

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

(ii) Three from e.g. :

Advantages:

(Loose) goods sold by weight


…electronic scales required to input weight of goods which is quicker than manual
weighing
…to determine total cost of purchase
…(loose) goods have no bar code so scales weigh these quickly
Customers can weigh and price goods themselves

Disadvantages:

Misidentification of the actual item being weighed can lead to inaccurate pricings
Poor calibration of the scales can lead to inaccurate weights/pricings being recorded

Max 2 for all advantages or all disadvantages [3]

(iii) Three from e.g. :

Advantages:

Required to enter barcode number


…if missing/corrupt/unreadable
Enter number of goods sold
…if multiples of same items purchased

Disadvantages:

Number arrangement favours right-handed individuals


Possible repetition of input of numbers as keys close together
Possible miss-key of data
Two standard layouts exist leading to possible confusion
Risk of health issues due to continual tapping of keypad

Max 2 for all advantages or all disadvantages [3]

(iv) Three from e.g. :

Advantages:

Shows details/pictures of items


…when choosing goods with no bar code
…no need to remember all the details/products
Can enter details of items
…by touching icons/images of goods
…so data entry is faster
Can show many layers of screens
…to show more details/more products
Can be considered to be more hygienic as can be cleaned/wiped easier than other
hardware
Can reduce space on counter/checkout/need for separate keyboard/pad

© Cambridge International Examinations 2016


Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

Disadvantages

Screens can get dirty so become unresponsive/will not work


Screens have to be within reach/may not be at optimum distance for viewing
If touchscreen crashes/becomes unresponsive then whole system is unusable

Max 2 for all advantages or all disadvantages [3]

(b) Six from:

Barcode is read at terminal


Barcode used to look up details of product in stock database
…product id field used
Number of items sold is sent to database
…number of goods sold deducted from value in field containing number in stock
Value in ‘number in stock’ field compared with value in ‘re-order’ field
…if value in ‘number in stock’ field is more than value in ‘re-order’ field
…then no action is taken
…if value in ‘number in stock’ field is equal to/less than value in ‘re-order’ field
…then a new order is automatically generated/printed
…record is flagged to indicate that a re-order has been generated
…order for replacement goods sent to warehouse computer system [6]

7 Eight from:

Advantages:

No need to stock large quantities of goods that do not sell quickly


Reduced costs of storage facilities on site
Less space needed for storing goods
…more space to display/sell goods
Goods always new/fresh
Reduced need for warehouse staff on site
…less cost
Can react to demand instead of anticipating change in demand for goods

Disadvantages:

More frequent deliveries needed


…increased traffic/pollution
Cannot take advantage of bulk discounts for very large orders
Delays in deliveries will mean empty shelves
…dissatisfied customers

Max 6 for all advantages or all disadvantages


1 mark is available for a reasoned conclusion. [8]

© Cambridge International Examinations 2016


Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 32

8 Eight from:

Benefits:

Supermarket gets exact software for its needs


Software will work exactly as required by supermarket
Software has the features specifically for the supermarket needs
Software does not have features which might distract the user/are not needed
Owning the rights to software code means supermarket does not have to share with competitor
Do not have on-going licencing/upgrade costs
Software will work with current systems

Drawbacks:

Can take a long time to develop


Costs more than off-the-shelf software because development costs are not shared
Need to employ a software company/team of software developers to write it
Limited help available
…no internet forums or websites
Need to provide employee training/cost of training
If software development company goes out of business then need to redo software at greater
cost

Max 6 for all benefits or all drawbacks [8]

© Cambridge International Examinations 2016


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 3 0 5 5 2 6 1 9 7 4 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 February/March 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages and 4 blank pages.

DC (NF) 115000/4
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

A large supermarket, located in Delhi, uses a computer system for a number of purposes.

The manager of the supermarket, Surinder, has introduced a service allowing customers to order their
groceries online for later delivery.

Surinder decides to employ Rafat, a systems analyst, to investigate how the online system could be
improved.

The supermarket has recently introduced a customer loyalty card. Customers who have a card, have it
scanned when they pay for goods. Details of the purchases are stored on the supermarket’s computer
system and discounts which the customer is entitled to are deducted from the bill.

© UCLES 2016 9713/12/F/M/16


3

1 (a) The supermarket uses laser, inkjet and dot matrix printers.
Describe a benefit and give an appropriate use for each printer in the supermarket.
Each benefit must be different.

Laser .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Inkjet .........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Dot Matrix .................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

(b) Rafat needs to research the present system. Describe each of the following methods and
indicate how they would be used by Rafat.

(i) Examination of documents

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Questionnaires

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(iii) Interviews

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2016 9713/12/F/M/16 [Turn over


4

(c) Part of Rafat’s job is to produce technical documentation for the updated system.
Describe the contents of the technical documentation.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/F/M/16


5

2 (a) Only a small number of customers have applied for a loyalty card.
Give three reasons why customers may not want to use such a card. For each reason, explain
one measure that Surinder can take to overcome the reluctance of the customers.

Reason 1 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Measure 1 .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 2 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Measure 2 .................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Reason 3 ..................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Measure 3 .................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/F/M/16 [Turn over


6

(b) A large amount of data is created by the computer system used in the supermarket.
Explain how this data can be used to help Surinder manage the store.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/F/M/16


7

BLANK PAGE

© UCLES 2016 9713/12/F/M/16 [Turn over


8

Scenario 2

Question 3

Johannus is writing a report for the management of the publishing company which he works for.
The information he produces needs to be wide-ranging and presented in such a way that it is easily
understood.

When Johannus has finished his report he decides to send it to his department manager for her
comments before submitting it to the management of the company.

© UCLES 2016 9713/12/F/M/16


9

3 (a) (i) Johannus sends the report electronically.


Give two reasons why Johannus compresses the file before it is sent.

1. .......................................................................................................................................

...........................................................................................................................................

2. .......................................................................................................................................

...................................................................................................................................... [2]

(ii) Explain how his manager can use word processing software features to make any
necessary amendments clear to Johannus when the report is returned to him.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(b) The management are very impressed with the report that Johannus has produced. They
decide that a copy should be given to each employee of the company. The report is produced
on a monochrome (black and white) printer.
Explain how the clarity of the graphs and charts in the report can be maintained.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2016 9713/12/F/M/16 [Turn over


10

(c) The publishing company use computerised plate making to produce the printing plates
necessary to print magazines.

(i) Describe how computerised plate making is used to print a page in a magazine.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) Describe four benefits of using computerised plate making.

1. .......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2. .......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

3. .......................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

4. .......................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

© UCLES 2016 9713/12/F/M/16


11

BLANK PAGE

© UCLES 2016 9713/12/F/M/16 [Turn over


12

Scenario 3

Questions 4 and 5

NWtyre is a business which deals with replacing car tyres on vehicles.

There are many hundreds of different tyres which vary in a number of ways, including price.

Each tyre has an ID code consisting of two letters followed by three digits. The letters are the first two
letters of the make of car for which the tyre was designed and the three digits are added to make the ID
code unique for that tyre type.

NWtyre are considering using robots to change the tyres on vehicles.

© UCLES 2016 9713/12/F/M/16


13

4 (a) Details of the tyres are kept in a flat file with the following structure:

Field Name Data Type Description

Tyre_ID Five character ID code for tyre

Price Price per tyre in Rupees

No_In_Stock Number of that type available immediately

Whether or not it can be safely mixed with other


Mix
tyres

Manufacturer Name of company that makes the tyre

Fill in the data types for each field name. [3]

(b) When the data of a new tyre is entered into the file it must be checked for accuracy.

(i) Explain what is meant by verification of data and describe how data input to the Tyre_ID
and Price fields should be verified.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) Explain what is meant by validation of data and describe how data input to the Tyre_ID
and Price fields should be validated.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2016 9713/12/F/M/16 [Turn over


14

5 (a) Describe the use of two end effectors which would be used by the robot.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Give four benefits to NWtyre of using robots.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2016 9713/12/F/M/16


15

BLANK PAGE

© UCLES 2016 9713/12/F/M/16 [Turn over


16

Scenario 4

Question 6

Soydelight is a restaurant which has a small range of dishes made from soya beans.

Customers order their food at the counter where an assistant uses a touchscreen to input each order.

© UCLES 2016 9713/12/F/M/16


17

6 (a) Explain why the assistant enters customer orders using a touchscreen instead of other input
devices.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/F/M/16 [Turn over


18

(b) A spreadsheet is designed to show when a supplier should be contacted so that more of a
particular item can be ordered.

A B C D E F G H
1 Item Number_In_Stock Minimum Supplier Contact Supplier
2 Soyburger 975 400 105 =IF(B2<C2,VLOOKUP(D2,G$2:H$4,2,FALSE),“No order”) 105 Soyplies
3 Soyfish 269 200 105 245 Veggie Ltd
4 Bread rolls 1284 600 361 361 Breadisus
5 Tomato 432 150 245
6 Lettuce 95 50 245

Explain the purpose of the different parts of the formula in cell E2.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2016 9713/12/F/M/16


19

(c) The restaurant is kept cool by a microprocessor-controlled air conditioning system.


With the aid of a labelled diagram, explain how this type of system works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2016 9713/12/F/M/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/12/F/M/16


CAMBRIDGE INTERNATIONAL EXAMINATIONS
Cambridge International Advanced Subsidiary and Advanced Level

MARK SCHEME for the March 2016 series

9713 APPLIED INFORMATION AND


COMMUNICATION TECHNOLOGY
9713/12 Paper 1 (Written A), maximum raw mark 80

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the March 2016 series for most Cambridge IGCSE®
and Cambridge International A and AS Level components.

® IGCSE is the registered trademark of Cambridge International Examinations.


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 12

1 (a) Laser
Fast output for large volume jobs/high quality printout [1]
For sending communications to suppliers in order to give a good impression/letters to loyalty
card holders/flyers/bar codes of products/to print out daily sales figures/invoices [1]

Inkjet
High quality, glossy colour printouts/cheaper to run than colour laser printer [1]
To print out posters/information to customers about special offers [1]

Dot matrix
They produce multiple copies simultaneously/can print continuously [1]
Used to print out orders to suppliers so that different copies can be stored in different
departments (accounts/manager/grocery)/print payslips/receipts at checkouts [1]

(b) (i) Examination of documents


Looking through technical and user documentation about the current system/
documents produced by current system/two of checkout receipts/ payslips/order
forms/invoices [1]
Find out information about transaction types and goods on sale/to study what data is
collected and what information is output/to identify inputs and outputs of the system [1]

(ii) Questionnaires
Asking users of the current system questions about the current system in the form of
hard copy/complete form on paper/on-screen [1]
Collect data directly from a large number of system users [1]

(iii) Interviews
Asking users of the current system questions about the current system face to face/in
person [1]
To get more in depth answers from management/users of current system regarding the
current system/eliciting answers by asking follow up questions dependent on the replies
given [1]

© Cambridge International Examinations 2016


Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 12

(c) Six from:

Systems documentation:
A detailed overview of the whole system
What is expected of the system/purpose of the system
Data Flow Diagrams/systems flowcharts
The results of systems analysis
Test plan and test results
Overall design decisions…
…the choice of hardware and software
…file, input and output structures
Systems flowcharts

Program documentation:
Description of the software/purpose of the software
What the software does and its features
Program listing - a complete copy of the code used
Annotation explaining what each module of code does
Reasons for choosing those pieces of existing software that were used instead of the
programmer having to write code
Input and output data formats
Program flowcharts/algorithms
Notes that will help any future programmer to make modifications to the system [6]

2 (a) Three pairs of answers from:

Afraid that a lot of staff will see customers’ personal information and that it will become public
knowledge/given to the wrong sort of people
Explain that access to the information is restricted to just a few staff/staff are trustworthy and
know their responsibilities to the customer

Afraid that the information may be passed on to other organisations


Explain that the information is covered by the data protection legislation which forbids the
handing on of data to unauthorised third parties/explain the systems in place to protect the
data/limited amount of data will be collected

Because they do not trust the information held to be accurate


Allow the customer to view the information held about them

Customers may intend to use the new online shopping method only, which may not allow
them to scan loyalty cards
Amend the online shopping system to enable customers to type in their loyalty card
number/enable it to be scanned by delivery driver

Might think they have to pay for the loyalty card


Explain that the card is free to obtain

Might not be aware of the scheme


Produce posters/flyers/web site ads publicising the scheme

Thief could steal their card and use their discounts


Introduce a PIN system [6]

© Cambridge International Examinations 2016


Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 12

(b) Six from:

Sales reports can be used


Can see what products are selling well/poorly/popular/unpopular…
This leads to ordering more/fewer of those products
Can offer discounts on poorly selling products
Future ordering can be based on past sales
Can order immediately if out of stock
Can ensure stock never runs out
Reports on customer spending habits via analysis of till receipts/loyalty cards
Based on customer spending habits target marketing/vouchers sent to specific customers
Business performance management to indicate where investment may be needed
Individual checkout operators have their performance measured
Can determine training needs for specific workers
Can identify individual departments which are not performing as well as others
Predictions can be made for budgeting over future years
Payroll reports can be produced to ensure total salaries paid is affordable [6]

3 (a) (i) Two from:

Reduces the size of the file


File will take up less storage space on the manager’s computer
Means that the file arrives more quickly than it otherwise would [2]

(ii) Three from:

Use comments which do not alter the document


Johannus can then amend or reject comments as appropriate
Comments can be in different colours/forms to indicate importance of change
Use of comments/titles in headers and footers to establish version
Use of text highlighting to show amendments [3]

(b) Three from:

Printed in grey scale


Draft quality should not be used
Care must be taken when drawing graphs to choose colours/patterns that will be
distinguishable in grey scale
The chart should be large enough for all parts to be seen when it is printed/not distorted by
fitting to a page [3]

© Cambridge International Examinations 2016


Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 12

(c) (i) Three from:

Film negatives are produced from digital files


(Ultraviolet) light is allowed to pass through the film negatives…
…to expose the printing plate
Design is produced on computer system (using suitable software)
Design etched by producing ‘spots’ on plate…
…density of/sizes of spots determine the resolution of etching
Precise nature of etching allows for halftones to be produced
Aluminium plate is bent around the plate cylinder
Plate cylinder has ink directed onto it
Rotates against blanket cylinder forming an image
As blanket cylinder rotates it presses against the paper causing the image to be printed
Impression cylinder just presses paper against the blanket cylinder [3]

(ii) Four from:

Improved print quality


Plates are more consistent which helps re-printing/plates identical every time they are
produced
Production of plates is much quicker
Easier to amend magazine prior to printing/no need to produce plates until final print
Cheaper as fewer plates need to be produced
Safer because it reduces the use of hazardous chemicals/reduces volume of waste
materials produced [4]

4 (a)
Field Name Data Type

Tyre_ID Text/alphanumeric

Price Numeric, currency

No_In_Stock Numeric, integer

Mix Boolean

Manufacturer Text/alphanumeric

5 correct answers – 3 marks


4 correct answers – 2 marks
3 correct answers – 1 mark
1 or 2 correct answers – 0 marks [3]

© Cambridge International Examinations 2016


Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – March 2016 9713 12

(b) (i) To ensure data is copied accurately from one medium to another [1]

Two from:

Visual verification
Visually compare data on screen/printout with original/source document
Double data entry
Two people type in data/one person types in data twice
Computer compares two versions
Keyboard freezes/sound made/data flagged if differences occur
Decide which version is correct if differences are spotted [2]

(ii) Three from:

Validation is to make sure that data entered is sensible for that field [1]
Tyre_ID field would be subject to a format check/input mask to ensure it consists of two
letters followed by three digits [1]
Price field would be subject to a range check of…(any sensible range of rupees) [1]

5 (a) Two from:

Cameras to inspect the tyre


Grippers to pick up tyre
Spanners to unlock/tighten nuts on wheel [2]

(b) Four from:

There are lower running costs/no need to pay robot’s wages


Work/work rate is of a consistent standard
NWTyre is now in a position to offer a 24/7 service
It is a safer/less dangerous environment for humans
Greater productivity [4]

6 (a) Six from:

Has a limited menu so all the options can be clearly shown on a single screen
The use of a touchscreen will reduce the number of input errors compared to using a
keyboard
Selecting an item on screen is easier than controlling a mouse
Entry of data is quicker than with a keyboard/mouse
Needs less room than a screen and keyboard/mouse
Amount of training required is less than with other devices
Touchscreen is more robust than keyboard/mouse for use in greasy/dirty conditions
More suitable for disabled cashiers [6]

© Cambridge International Examinations 2016


Pag
P ge 7 Mar
M k Sch
S hemmee Sylllab
S bus Pape
P er
C mb
Cam brid
dge
e In
nte
ern
natiion
nal AS
S/A
A Lev
L vel – Ma
arc
ch 2016
6 9 13
971 12

( ) Six
(b) S x fro
om
m:

Deccides wh
D hettheer a supplie er ssho
oulld be
b coontaactted
d…
… if so, givvess thhe name e off th
he supplierr
U es the
Use e IFF fu
uncctioon to comp parre the
t e nuummbe o item
er of ms in sto ockk/c
con ntennts off B22w
with
h th
he
m nim
min mumm stoc
s ck lev vel//co
onteentts of
o C2
C2…
…and
…a d if low
wer, d disppla
ayss th
he ssuppplierr na
amme/cconnte
entsso of H2
H
… if not, looweer itt disp
playys “No ord
o der””
V OO
VLO OKU UPP is ussed d to
o search h th
he loookuup tabble off su
uppplie
ers//G22:H
H4
Am mattch too the vvalue in ce ell D
D2 is seearche ed for in
n coolu
umn G
N eds
Nee s to
o be
b ana ex xacct mat
m tch h beecaausse of thee ‘F
FALS SE’ pa art of
o the
t e foormmula
T e ‘2
The 2’ in
nsttrucctss th
hat whhenn a matc
m ch is ma adee th
henn th
he ap pprooprriatte vvallue
e is
s re
ead
d from
m th
he
s con
sec nd col
c um mn//colum mn H of the lo ookup p taable
T e $ is us
The sedd too ensu ure
e th
hatt the refe
r ere encces
s to
o th
he loo
l oku up tab
t ble//G2 2:H
H4 are e mai
m ntaained when
th
he formula a is
s reeplicaatedd 6]
[6

(
(c) E ght fro
Eig om:

Coils of
C o tub
t bing g ffille w h a re
ed wit efriige
erannt…

…one
…o e cooil is ins
i side e thhe rooom
m an nd thee oth
o er is outsid de
C mp
Com presssoor con
c nve erts
s coo
c ol lo
ow--prressure ga as intoo hot higgh--pre
esssurre gas
g s
T e gas flo
The ows s to
o a co ondden
nsing un nit outsidde the bui
b ldinng
C nde
Con enssing uni
u t allow
a ws s re
efrig
gerrannt to coo
c ol/ccoools ga
as tto form
f m liqu
l uid
d
B ck in the
Bac t e build dinng it pas
p sses thro ouggh a vvalve…
…wwhich h ca aussess th he liquid
d to
o evaporatte into o cold
c d loow--press surre gas
E apora
Ev atin
ng un nit is situ
s uate ed insside the
t e re
estaaurrannt…

…abs
…a sorbbs he eat fro om su urro
oun ndss th
herrebby ccoo
olin
ng resstauraantt
C rrec
Cor ctly
y pos
p sitio one ed evapora atin
ng unit des
d scrribeed/shoowwn on
o dia agrram
m
C rrec
Cor ctly
y pos
p sitio one ed condensin ng unu it des
d scriibe
ed/sshoow
wn ono dia agrram
m
C rrec
Cor ctly
y pos
p sitio one ed valve e deesccribbed
d/ssho
own n on a diag gra
am
C rrec
Cor ctly
y pos
p sitio one ed comp preessor de escribed/sh howwn onn diaggram
C rrec
Cor ct ind
i dica atio
on of wa armma air des
d scrribeed//showwn on
o a dia agrramm
C rrec
Cor ct ind
i dica atio
on of cold airr de esccrib
bedd/show wn
n onn a diiag
gram

6m
max
x iff no
o dia
d gra
am
m
V
Valv
ve

C
Cold air
a

C nden
Con ng Un
nsin nit E
Eva
apo
ora
atin
ng Un
nit

W ma
Warm air

Co
ommprresso
or
[8
8]

© Ca
amb
brid
dge
e In
nterrnattion
nal Ex
xam
mina
atio
ons
s 20
016
6
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 Written A October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

1 (a) Four from:

Fixed hard disk drive used to store software/OS/students’ work


Portable hard disk drive used to transport large files between home and college/to make
backup copies of files
Magnetic tape cartridge readers used to store backup of course work/software by college
network manager
DVD writer/reader to store videos of coursework
CD writer/reader used to store audio of student’s work
DVD/CD writer/reader to make permanent backup copies of files/to transport coursework
between home and college/to import files/software to system
Memory stick/pen drive/flash drive/disk/memory card to make backup copies of files/to
transport coursework between home and college
Solid State Drive used to store software/student’s work
[4]

(b) (i) Spreadsheet:


Two from:

To enter/store weather data/readings taken (over the course of the month)…


…such as rainfall, temperature against time
To produce graphs of weather data…
…such as rainfall, temperature against time
To perform automatic calculations on weather data…
... to produce mean values of rainfall/temperature/calculate range of temperatures
To model weather data…
…to produce predictions of future weather patterns [2]

(ii) Database:
Two from:

To enter/store weather readings taken (over the course of the month)…


…such as rainfall, temperature against time
To manipulate the data into groups…
…such as days of sunshine exceeding certain number of hours/rainfall less than a
certain amount
To create filters/queries to produce reports on weather readings…
…such as days in the month with no rainfall
To produce graphs of weather data……
…such as rainfall, temperature against time
To perform automatic calculations on weather data… [2]
... to produce mean values of rainfall/temperature/calculate range of temperatures
To produce summaries…
…such as the wettest week of the month/warmest week of the month

(iii) Web browser:


Two from:

To allow Didier to search the internet for weather data…


…to find images to paste into his coursework…
…so that his readings can be compared with existing data
Allows him to access his email account…
…so that he can send weather data to college/home via email
[2]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Six from:

Type a specific URL into the address bar


Click on hyperlink from a relevant webpage
Use a search engine (to make a query)…
…type in ‘climate’/’weather’ into the search engine
Use Boolean operators to narrow down /widen his search
Use speech marks to narrow down his search
Use wildcards to narrow down his search [6]

2
File contains no formatting information

.csv file
Allows user to choose different fonts and effects

.rtf file Distinct data items are separated by commas

File used for transferring data between


.txt file spreadsheets

File contains text mixed with tags which are used


to turn effects on and off

Can be opened by all word processors

6 lines correct give 4 marks.


5 lines correct give 3 marks
3 or 4 lines correct give 2 marks
1 or 2 lines correct give 1 mark
0 lines correct give 0 marks [4]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

3 (a) (i) Two from:

Combinations of the different widths stand for different digits


There are a specific number of different widths used
Pairs of bars and the associated gaps between them are used to represent the digits
The outside bars are used to inform the computer when the barcode starts and stops
and in which direction it is being read
[2]
(ii) Two from:

Represent the ID number of the item being scanned


Allows the details of the item to be found in the stock database
Necessary in case the bar code will not read properly
[2]
(iii) Six from:

Data can be used to provide itemised receipt for customer


Rate at which barcodes are read can provide management information about
performance of checkout workers
Data can be used to provide automatic stock control/keeps accurate records of stock
levels
Provides up to date number of items in stock
Provides information of popularity or otherwise of stock items
Provides advice about ordering
Can be used to automatically trigger orders for some stock items
Product number is looked up in stock file/checks if product exists in database
Price is read from product number in stock file/displayed on screen
Name/description of product is read from stock file/displayed on screen
Reduces number in stock by quantity purchased [6]

(b) Six from:

Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]

Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]

Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Four from:

The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash

4 (a) Four from:

Benefits:

Can compare products and prices at their leisure


Can shop at a convenient time for them/24/7
Customers can shop at their favourite store even when they live far away
Customers don’t have to spend time travelling to shop
Customers don’t have to spend money travelling to shop
Disabled customers will find it easier than travelling to shop
There will be a greater choice of goods
Don’t have to spend time queuing

Drawbacks:

Disabled people may have problems navigating through screens


Customers who do not have a credit/debit card will not be able to use online shopping
Security concerns about data transmitted over internet such as hacking, phishing, pharming,
spyware, viruses, malware (must have two)
Description of phishing
Description of pharming
Can order goods and they don't get delivered
Goods are not to the same standard as those ordered/wrong goods delivered/substitute
goods delivered
Can’t check the standard of goods before buying/can’t be sure the goods are in stock
May be hidden costs such as delivery charges
Description of viruses
Expense of buying a computer with a broadband internet connection/must have a reliable
electricity supply/basic computer skills
[4]
Must have at least one of each to gain full marks

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(b) (i) Three from:

Headaches– ensure that monitor is at the correct height/distance/position/focus on


distant objects from time to time/take regular breaks and walk around/use screen filter

Eyesight problems- ensure that monitor is at the correct height/distance/position/focus


on distant objects from time to time/take regular breaks and walk around/use screen filter

RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard

RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time

Back/neck problems – maintain good posture/sit in a straight backed chair/sit in a height


adjustable chair/ensure that monitor is at the correct height

Deep vein thrombosis – take regular breaks and walk around [3]

(ii) Aggregated information:


In the reports data is combined and no individual is identified [1]

Data Protection legislation:


Legally binding rules/laws governing the use of personal data [1]

Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]

5 (a) Six from:

Patient’s condition is monitored using microprocessor/computer and sensors


Sensors/computers used to monitor blood pressure, pulse rate, body temperature, Oxygen
level in blood, blood sugar (must mention at least two)
Sensors feed back body functions to the microprocessor/computer
Readings can be taken at predetermined time intervals
Computer is pre-set with the normal range of values
Computer is (constantly) comparing the data fed back by the sensors…
…..to these pre-set values
If any data is outside the pre-set range the computer (sends a signal to) sound an alarm/
increase dose of a drug
Data readings are stored on computer system for doctors to use later when visiting
recovering patients
[6]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(b) Two matched pairs from:

Graphical/numerical output of patient’s readings/condition…


…can be seen/give an indication of condition from a distance so nurse can glance at each
patient monitor quickly

Hard copy printout of results/patient’s condition over a specific period…


…to allow doctor to analyse changes in condition after the event/shows trends/can be taken
away for later checking

Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded

Heart monitor beeping…


…regular beeping to indicate normal heart beat/continuous beeping to alert doctors/nurses to
problem
[4]

6 (a) Three matched pairs from:

Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family

Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family

Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day

Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]

(b) Six from:

Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Eight from:

Website created/produced using web authoring software


A cheap form of advertising nationally and internationally/can advertise to a very large
audience
More expensive initially to have own website – web designer has to be employed
Can produce a website to own specification
Website has more features than most other forms
Has range of multimedia – sound, video/animation, (text, images)
Can have hyperlinks to other sites/pages
Can advertise on other people's websites
Cheaper than using own site
Banners/pop ups/pop unders can be used
Pop-up grabs user's attention
Can upset users who then do not shop there in future
Users have pop-up blocking software which doesn’t allow pop-ups to appear
Can use pop-unders which are not removed by pop-up blocking
Can advertise their name by getting it included in an online directory

(Multimedia) presentations/slide show used on purpose-built display monitors…


…placed in strategic locations
The presentation/slide show is produced using presentation software
Has range of multimedia – sound, video/animation, (text, images)
Other features e.g. slide transition effects, special text effects, image transition
Always on while mall or store is open
The user cannot switch it off
Quicker to update than an internet site or television commercial

Flyers created using DTP software/word processing software


Used by individuals or small businesses
Used to advertise in the local community therefore have limited impact
Can be produced using own PCs and printers
For larger print runs have to take to the printers – increased costs
Quick to produce
DTP allows character shapes, variety of patterns, colours
Can be distributed to target audience
Limited to local audiences

Posters produced using word-processing/desktop-publishing/presentation software


Due to size have to be printed by professional printers – expensive
More usually, presentation because of ability to use very large paper sizes
Limited exposure due to position of site/static display
Posters are more eye catching than fliers
Can be placed in strategic positions

E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge

Must have more than one method to gain full marks [8]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 2 0 1 7 7 9 9 8 0 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (LEG) 115297/4
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

Paraiso College has a large number of students who attend classes at three campuses.

A large number of different courses are available covering many subject areas. The technology faculty
is very well equipped and supports students who are involved in completing a number of different
projects.

Each student at the college is issued with a plastic card containing information stored on a magnetic
stripe. This card is used to gain entry to each of the college campuses.

Students at the college need to use the internet in order to find background information for their project
work. A large amount of information will be available when they search the internet.

The Technology department at the College has decided to produce a handbook detailing the equipment
that is available for use by students. The handbook needs to be as accurate as possible because it will
be used as a reference by students in the department.

© UCLES 2016 9713/13/O/N/16


3

1 (a) The college provides a number of devices which produce hardcopy. Describe three of these
devices that could be used by the students in their project work, explaining what each device
would be used for.
Each use must be different.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/13/O/N/16 [Turn over


4

(b) (i) Explain the drawbacks of using magnetic stripe cards to gain entry to the college.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[4]

(ii) Explain the different ways the card could be used by both the students and the college
authorities.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[5]

© UCLES 2016 9713/13/O/N/16


5

(c) Explain how students can evaluate the reliability of information resulting from a search on the
internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

2 Describe, in detail, how the content of the handbook can be checked to ensure that it is as error
free as possible.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/13/O/N/16 [Turn over


6

Scenario 2

Question 3

Intweb is a company that specialises in creating and managing webpages for other companies and
organisations.

Spreadsheet software is used to store details of customer accounts. A word processor is used to
produce communications with customers.

Other software is used to create the items (assets) for inclusion in the web pages.

The data stored on Intweb’s websites needs to be secure. The staff who develop the software also
need to be aware of the potentially sensitive nature of the data stored.

© UCLES 2016 9713/13/O/N/16


7

3 (a) Apart from those in the scenario, describe how five other types of software could be used to
create the assets for the web pages.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

5 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) (i) Other than physical methods, describe two ways of ensuring the security of the data on
the websites.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/13/O/N/16 [Turn over


8

(ii) Five security/privacy issues have been described below. In each case, name which issue
is being described.

Obligation arising under common laws where a person is obliged not to disclose
information to a third party.

...........................................................................................................................................

Employees must be loyal to their employers for as long as they work for them.

...........................................................................................................................................

Information is stored about individuals without actually naming them.

...........................................................................................................................................

Personal details about individuals are combined to provide information in such a way that
individuals cannot be identified.

...........................................................................................................................................

Provides a legal framework to protect an individual’s information.

.......................................................................................................................................[5]

© UCLES 2016 9713/13/O/N/16


9

Scenario 3

Questions 4 and 5

Nistoy is a car manufacturer.

One model that it produces is called the Yaraven which is produced on a production line without the use
of robots.

Another model, the Aymic, is produced on a production line that makes full use of industrial robots.

The robotic production line for the Aymic has been so successful that the management of Nistoy have
decided a similar system should be introduced to produce the Yaraven.

Liene is the systems analyst who has been asked to oversee the automation of the Yaraven production
line.

© UCLES 2016 9713/13/O/N/16 [Turn over


10

4 (a) The robots used on the Aymic production line were very expensive to buy.
Describe in detail two advantages to the company of using robots on a production line.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The engine compartment of the Aymic needs to have two new holes drilling in it so that a
windscreen washer can be fitted.
Describe how a programmer would program the robotic arm to drill the holes in the correct
position.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/13/O/N/16


11

5 (a) Describe each of the following methods of implementation that Liene could use and explain
how each would be used in the car factory.

Parallel running:

Description ................................................................................................................................

...................................................................................................................................................

Method of Use ..........................................................................................................................

...................................................................................................................................................

Direct changeover:

Description ................................................................................................................................

...................................................................................................................................................

Method of Use ..........................................................................................................................

...................................................................................................................................................

Phased implementation:

Description ................................................................................................................................

...................................................................................................................................................

Method of Use ..........................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/13/O/N/16 [Turn over


12

(b) Discuss advantages and disadvantages to the workers of the introduction of robots to the
Yaraven production line.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/13/O/N/16


13

Scenario 4

Questions 6 and 7

The government of a large region of a country has a number of departments. One of these departments
is called Youngov.

Youngov is concerned with young people and their problems.

Youngov collects data annually and creates graphs and charts to make the data more easily understood.

Another government department is concerned with the payroll.

© UCLES 2016 9713/13/O/N/16 [Turn over


14

6 (a) For each of the following sets of data, explain why the type of chart or graph has been chosen.

The number of young people in each age group (0–5, 6–10, 11–15 and 16–20).
Type: bar chart

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

The proportion of young people in each age group (0–5, 6–10, 11–15 and 16–20).
Type: pie chart

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

The number of young people in different types of educational institution (first school,
secondary school, college, university) compared with the previous year.
Type: comparative bar chart

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

The number of 18-year-old pupils in full time education in each of the last ten years.
Type: line graph

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/13/O/N/16


15

(b) One of Youngov’s responsibilities is to consider the health and safety issues faced by young
people who are using computers.
Apart from RSI, describe three other health issues that should be considered.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2016 9713/13/O/N/16 [Turn over


16

7 The systems analyst who was responsible for the design of the payroll system had to decide
between using a sequential access filing system and a random access filing system.

(a) Compare and contrast the use of a sequential access filing system and a random access
filing system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2016 9713/13/O/N/16


17

(b) Describe how the payroll file is updated using sequential access for the master and transaction
files.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/13/O/N/16


18

BLANK PAGE

© UCLES 2016 9713/13/O/N/16


19

BLANK PAGE

© UCLES 2016 9713/13/O/N/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/13/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/13


Paper 1 Written A October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 7 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

1 (a) Three matched pairs from:

Laser printer produces high quality hard copy by using toner


Used to print out projects/coursework

Inkjet printer produces high quality hard copy by spraying ink onto paper
Allows photo quality output of pictures to be included in the project/for draft quality of first
attempts of work

3D printer to produce solid, physical outputs/objects/models by allowing layers of material to


be produced
Allows students to print solid objects/models for technology projects e.g. solid representation
of a design from a CAD application

Wide format printer uses inkjet technology on large size paper


Used to produce printouts of projects produced in Art [6]

(b) (i) Four from:

Magnetic stripe cards are susceptible to magnetic interference which can wipe the data
on them
This can come from close proximity to a mobile phone
If the card is lost/damaged/stolen/forgotten/misplaced student cannot enter the college
If the card is lost/damaged/stolen/forgotten/misplaced student cannot access services
from the college
If the reader malfunctions student cannot enter the college
If stolen it can be used by unauthorised person/other student to enter the college or to
access services from the college
Can cause queues at entry points to the college because students have to find and use
the card [4]

(ii) Five from:

College authorities know how many students are present at any time (if card is also used
for exit)...
… important for emergencies e.g. fire drills
College could use it for individual student attendance records
Students could use card to pay for purchases like food, trips and books
College authorities could collect information on which resources are being used/not used
by students…
…to know the times of day when the library is heavily used
Students could use cards to borrow books from library
College can grant different access rights/privileges to groups of students
College could keep records of which students have borrowed equipment/resources
[5]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

(c) Six from:

If the author’s credentials are good it is likely to be reliable


Check the URL, does it end with .gov or .ac or .ed which usually indicates reliability…
.co or .com at the end of the website address indicates that it is a commercial site and is
likely to be biased
Compare information with other sites/other reliable books/text books
Check when the site was last updated – if the date of the last update was a long time ago it is
likely to be unreliable
If site has excessive advertising it could be unreliable/if the advertising is related only to its
own products it could be unreliable
If site is endorsed by reliable/reputable people/organisations it can be accepted as being
reliable/if it has links to other reliable sites/ sites which have testimonials it is usually
reliable/if it has testimonials it is likely to be reliable
Sites which have grammatical/spelling mistakes are likely to be unreliable
If it has been recommended by teachers it is likely to be reliable [6]

2 Six from:

Proof read and correct the document to ensure that it makes sense
Check for accuracy of description of equipment available and its use
Check for consistency of line spacing/character spacing to make sure that the distance between
lines/paragraphs/characters is standard
Check lists/tables/charts are not split over two pages
Check that there are no widows or orphans produced; no single lines from a paragraph/list are at
the top or bottom of pages without the rest of the text
Ensure that tables and charts fit boundaries of page/columns accurately
Use spellchecker to find misspelled words
Use grammar checker to ensure that document adheres to syntax of language [6]

3 (a) Five from:

Database to store details of customers and their requirements


Graphics software allowing the company to create illustrations to use in the webpages
Web authoring software to allow the company to produce webpages into which the assets
can be set for customers
Text editing software to type up html markup
Animation production software to create animated images/cartoons as assets for illustrative
purposes
Image editing to transform assets so that they fit the requirements of the page [5]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

(b) (i) Two from:

User Ids and passwords so that those who do not know the password are denied access
Encryption so that those who do not have the correct decryption key are
unable/understand to read the information accessed
Memorable data – something only the staff member knows used in conjunction with
User Id [2]

(b) (ii) Duty of confidence [1]


Duty of fidelity [1]
Anonymised information [1]
Aggregated information [1]
Data protection legislation [1]

4 (a) Two matched pairs from:

A robot arm has greater accuracy/fewer errors than a human…


…is able to reach a specific programmed position with a minimum of errors/sensors measure
variables more accurately than the human eye

There are lower running costs…


…after robots are paid for, there is no need to pay wages to the workers they have
replaced/there are lower utility costs

Work/work rate is of a consistent standard…


…they do not get tired and make mistakes

It is a safer/less dangerous environment for humans…


…robots are able to work in harsh/hazardous conditions meaning that humans don’t have to

The whole process can be continuous/24 hours a day 7 days a week…


….without having to stop at shift changeovers

Robots have greater productivity…


…robots can produce a greater quantity of products in a given period of time [4]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

(b) Four from:

The programmer controls the robot by physically guiding the arm through each step using the
drill
The programmer has sensors attached to his/her arm
The sensors transmit data to the computer
The computer stores the sequence of movements…
…as a program in its memory
The robot arm is therefore able to repeat the actions every time a new unit comes down
the assembly line [4]

5 (a) Three matched pairs from:

Parallel running:
The old and new systems are run at the same time
Computerised production of Yaravan and normal workforce production are run together until
the robot system has no bugs

Direct changeover:
The new system replaces the old system immediately
The old production line is shut down and the new one is installed in one go

Phased implementation:
Implementing one part of the system while rest of system remains unchanged/implementing
system part by part
The cars continue to be produced by the workforce but are painted by robots [6]

(b) Six from:

Advantages:

It is a safer/less dangerous/less hazardous environment for humans


The work areas are cleaner
Jobs are less boring
Don’t have to lift heavy weights

Disadvantages:

Unemployment
Will have to re-train in order to keep a job
Loss of social interaction with other workers
Deskilling can occur [6]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

6 (a) Four from:

Bar chart:

Individual values can be read from the axis/no meaning to intermediate values/emphasises
differences from one block to another

Pie chart:

Small number of segments used to show relative sizes/actual numerical values are not
important

Comparative bar chart:

Differences between figures for different institutions AND between different years are easier
to see

Line graph:

Shows the trend from one year to the next making extrapolation possible [4]

(b) Three from:

Staring at a computer screen continuously can cause problems with one’s sight
Typing at a keyboard continuously can cause RSI
Gripping a mouse and repetitive clicking can cause carpal tunnel syndrome/RSI
Sitting in the same position/with wrong posture all day can cause lower back pain
Staring at a computer screen all day can cause eye strain/headaches
Poor positioning of screen can cause upper back/neck/shoulder pain/eyestrain/headaches
Glare from screen can cause eye strain/headaches [3]

7 (a) Eight from:

Sequential filing is when the records are stored in order


Sequential – all records are read when the update to the files is carried out
Sequential – individual records may be slower to find
Sequential – individual records may take longer to edit
The only way to add new records to a sequential file is to store them at the end of the file
Sequential – a record can only be replaced if the new record is exactly the same length as
the original
Sequential – records can only be updated if the data item used to replace the existing data is
exactly the same length
The processing of records in a sequential file is slower than with other types of file
Random access filing is when the records are stored in no particular order…
… makes querying a single record easier
Random access filing – no need to keep a transaction file as changes can be made as and
when they happen [8]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 13

(b) Six from:

The transaction file is sorted in the same order as the master file
First record in the transaction file read
Reads first record in the old master file
These two records are compared
If records don’t match computer writes master file record to new master file
If it matches transaction is carried out

Then
If transaction relates to calculation of pay:

Computer calculates the pay


Using rate of pay from master file
Using hours worked from transaction file
Computer calculates the income tax/insurance/pension contributions
Computer subtracts this from total pay
Processed record is written to master file
Process is repeated until end of old master file

If transaction relates to deletion, amendment or insertion:

If deletion or amendment old master file record not written to file


If amendment/insertion data in transaction file written to master file
Process is repeated until end of old master file
Processed record is written to master file [6]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 3 9 7 0 8 7 9 4 6 9 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (ST/CGW) 113548/3
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2, 3 and 4

Faster Cars is a racing car company that produces high-speed racing cars.

The company uses CAD/CAM.

The company employs engineers and mechanics to maintain the cars. It has an expert system that can
be used by the mechanics when trying to diagnose faults in the car engines.

The company has its own racing drivers who use simulators to practise high-speed racing for when
they are driving the real racing cars.

© UCLES 2016 9713/31/O/N/16


3

1 (a) Explain what is meant by CAD/CAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe two specialist input devices that could be used by a designer using CAD.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe two specialist output devices that could be used by a designer using CAD.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9713/31/O/N/16 [Turn over


4

(d) Discuss the benefits and drawbacks of using CAD.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(e) Explain why the company would choose to use CAM to produce the cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/31/O/N/16


5

2 When a car engine develops a fault, a mechanic will use the expert system to help diagnose the
fault.

The diagram shows an outline of the expert system that is used by the mechanic.

Inference Interface to
data from car engine
outside
Engine world

car computer system

Knowledge
car mechanic
Base

(a) Describe two inputs to the expert system from the car engine.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain the use of two output devices that could be used by the interface.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9713/31/O/N/16 [Turn over


6

(c) Describe the knowledge base of the expert system and how it may be expanded.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(d) Explain how the inference engine of the expert system helps to diagnose the fault.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/O/N/16


7

3 Describe how each of the following output devices might be used in a racing car simulator.

motor

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

buzzer

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

large screen

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

loudspeaker

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/31/O/N/16 [Turn over


8

4 Discuss the benefits and drawbacks of using computer simulations to practise driving the racing
cars.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/31/O/N/16


9

BLANK PAGE

© UCLES 2016 9713/31/O/N/16 [Turn over


10

Scenario 2

Questions 5, 6 and 7

Floatem is a multi-national shipping company which owns a fleet of cruise ships. These ships sail to
and from ports all over the world carrying passengers on holidays.

Passengers may book holiday cruises in person at any office or online using the company’s website.

Every passenger cabin on the cruise ships is equipped with an entertainment system that can be
used to:

• listen to music from CDs


• listen to radio programmes
• listen to audio books
• access MP3 files stored on a file server
• watch video on-demand or satellite TV.

© UCLES 2016 9713/31/O/N/16


11

5 (a) Describe, including their purpose, six items of information that a customer would have to
enter when booking a holiday cruise online.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

6 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/O/N/16 [Turn over


12

(b) Explain why a customer would prefer to book a cruise online rather than at one of the company
offices.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(c) An e-ticket and an e-receipt are issued when a booking is made online.

(i) Describe one item of information that might be shown on the e-ticket.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe one item of information that might be shown on the e-receipt. This item must be
different from the one given in (c)(i).

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2016 9713/31/O/N/16


13

6 (a) Describe how each of the following could be used in the entertainment system in the
passenger cabins.

(i) USB port

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Flash memory card

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Explain why MP3 files are used to distribute content to the entertainment system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/31/O/N/16 [Turn over


14

7 Kumar, a passenger, decides to use the entertainment system to watch TV in his cabin.

(a) Kumar watches a live sports programme on a satellite TV channel.

Describe how the sports programme is sent to, and received by, the entertainment system for
Kumar to watch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/O/N/16


15

(b) Kumar watches a movie using the ship’s video on-demand system.

Explain how the ship’s video on-demand system enables Kumar to watch the movie of his
choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/31/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/31/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/31


Paper 3 Written B October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 6 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31

1 (a) Four from:

Computer Aided Design


....to create, modify, analyse designs

Computer Aided Manufacture


Use of (computer) software to control manufacturing machinery/tools
....to assist in all stages of the manufacturing process e.g. planning. [4]

(b) Two from e.g.:

Light pen for drawing directly on screen/when desk space is limited/might only have CRT
monitors
Trackerball for drawing when desk space is limited/less chance of picking up dust/reduced
risk of health issues/more accurate than a mouse/selecting options
Graphics tablet/use of stylus for inputting freehand drawings
Scanner for inputting hardcopy drawings/photographs/notes. [2]

(c) Two from e.g.:

CRT monitors/curved screens for several designers to see the design simultaneously
Plotter to produce large hardcopy of design drawings/blueprints
Laser printer to produce hardcopy of designs
3D-printer to produce model/prototype. [2]

(d) Six from:

Benefits:

Using CAD can be more accurate with measurements than traditional drawing methods
Using CAD can reduce human error in use of/placing components from library for the
drawings
Using CAD allows drawings to be saved/edited/modified at various stages in the process
Using CAD allows drawings to be saved/edited/modified by several designers
Using CAD allows drawings to be sent electronically to designers/email
Using CAD enables analysis of interaction of components
Using CAD enables analysis of component costs
Using CAD allows rotation/zoom of views

Drawbacks:

Using CAD requires a computer system which can be expensive/initial costs are high
Using CAD can be slower than traditional methods for one-off/low-volume production
Increased costs as workers need to be trained how to use the software and machinery.

Max 4 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion. [6]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31

(e) Four from e.g.:

The results of manufacturing using CAM are consistent (always the same)
Using CAM enables very high accuracy levels in large-scale production
CAM can produce/machine very intricate/difficult shapes
Using CAM can speed up production of low-volume products
CAM can be run for very long periods e.g. 24 hours a day, 7 days a week
Can be linked to CAD, so that designs are electronically input to machinery. [4]

2 (a) Two from:

Data about speed/from engine rotation/flywheel revolutions collected by using a light sensor
Temperature data from oil/water/exhaust systems collected by using temperature sensor
Data about pressure of coolant/oil systems collected by using a pressure sensor
Data about air/fuel ratio from exhaust gases/manifold/before and after catalytic converter
collected by using oxygen/lambda sensor
Data from the engine management system. [2]

(b) Two from:

Printer to output hardcopy of results/data/possible diagnoses


Screen/monitor to show possible diagnoses/current readings/warnings/data summaries. [2]

(c) Six from:

Consists of database of facts/car engine faults/solutions and the rules base


Holds database of knowledge from experts
...for use by inference engine
Stores unstructured and structured information
Is updated by inference engine
Using forward chaining
Existing facts are used to create new facts
Is updated by additional input of facts/knowledge from experts
New rules can be generated
User can enter new parameters/variables
Can import parameters/data from other systems. [6]

(d) Six from:

Receives data from user interface from mechanic/from car engine sensors
Checks knowledgebase for matches to data input
Checks the rules to find relevant rules that match knowledgebase facts
....using forward/backward chaining
Chooses/selects relevant rules
...prioritises rules found in knowledgebase
Executes rules in order of priority
Repeats the steps from check knowledgebase to execute rules
.....until no more matches for condition/data input
Use of if-then-else logic/action
Applies logical rules
Interprets facts in knowledgebase to provide possible diagnoses/probabilities
Suggests possible faults. [6]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31

3 One description for each:

Motor: to move whole simulator/parts of simulator/open,close valves in hydraulic rams for moving
the simulator

Buzzer: output sound/audible alert as warning/information

Large screen: display car track/ scenes/ views of road ahead

Loudspeaker: output sounds of car noises/ambient sounds/instructions from instructor. [4]

4 Eight from:

Benefits:

Drivers are not put in physical danger/can be safer/less risk of being hurt/no risk to life
Different/extreme conditions can be simulated so no need to wait for natural occurrence
Different conditions/scenarios can be repeated
Running costs/fuel consumption lower than real cars
Simulation can be recorded for later playback/analysis
...feedback can be visual overlays as well as verbal comments
...computer can objectively assess performance c.f. observations by instructor
Manoeuvres/actions can be demonstrated by the simulator
Crashed/damage to virtual cars does not cost money to repair

Drawbacks:

Can be difficult to simulate all conditions found on race tracks


Can be expensive to create a realistic simulation
Not all variables can be included in a simulation
Drivers may be more reckless in simulations because of lack of real danger
Lack of a realistic experience for drivers
...skills may not transfer from simulator to real driving
...lack of retention of skills/knowledge learned in simulator
Occurrence of ‘simulator sickness’ due to
...motion sickness where movement of body does not match what is shown on screen
...lack of smooth movement on screen during rapid changes of position
...latency between moving the steering wheel and simulator responding

Max 6 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion. [8]

5 (a) Six from e.g.:

Name for identity purposes


Address for billing purposes
Email address for confirmation of booking
Telephone number for (emergency) contact
Credit/debit/bank card details for payment
Number of passengers for accommodation/safety purposes
Ages of passengers for allocation of amenities/facilities
Number of rooms/cabins required for passenger manifest/accommodation allocation
Departure/arrival ports for itinerary
Dates of travel/cruise for logistical/booking purposes. [6]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31

(b) Six from:

No need to waste time on travel to company offices


Saves cost of travel to company offices
Can more easily compare prices of cruises/options available
Prices can be cheaper when booked online since company
Less pressure from sales people to buy extras/upgrade
Can browse with no pressure to actually book/purchase
Employs fewer staff and has lower costs
Can check availability immediately
Can get immediate confirmation of booking
Do not need to wait for tickets/details to arrive as these are sent by email. [6]

(c) (i) One from e.g.:

Barcode/matrix code with details of booking/booking reference


The official ticket number/ticket identification number
...with a check digit
Baggage allowance. [1]

(ii) One from e.g.:

MUST be different from response given in (i):


Barcode/matrix code with details of booking/booking reference
The official ticket number/ticket identification number
...with a check digit
Carriage terms and conditions
..fare and tax details/codes indicating costs
Indication of form of payment
Baggage allowance. [1]

6 (a) (i) Two from:

Upload firmware upgrades


Link via cable to other devices
Access music/video files on USB storage devices/mp3 player. [2]

(ii) Two from:

Store music/video files for playback


Record music/video files from entertainment system/use as PVR storage
Store firmware upgrades
Transfer files to/from entertainment centre. [2]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 31

(b) Four from:

Files are compressed to save storage space/bandwidth when transferred


...loss in quality is acceptable
...can be up to 90% reduction in file-size
Standard format for music/audio files
...can be played by most devices
...entertainment system may not be able to play other audio file types/may be only audio file
type entertainment system can play
Data can be added to file
....to describe contents of file e.g. song, artist etc. [4]

7 (a) Six from:

Video and audio encoded into digital format (by camera/at studio/in outside broadcast truck)
Video/audio edited for transmission/may have short time delay introduced
Sent by cable/satellite link to studio
Sent by cable to uplink station/dish
Received by receiving dish on (geostationary) satellite
Frequency altered and sent to transponder on (geostationary) satellite
Transmitted to ground/downlinked to dish on ship
LNB on dish on ship receives signal from satellite
Signal sent to receiver via cable
Signal distributed to entertainment systems around the ship/in cabins
Receiver converts signal into viewable audio/video. [6]

(b) Six from:

Movies/video stored on servers accessed via (local) network


Kumar has direct access to files stored on server
Movie compressed to save storage space/transmission bandwidth to achieve smooth
playback/reduce lag/buffering
Kumar has a PIN required to view movie
Each cabin has set-top box/receiver required
Menu/list of movies shown on screen
...can be sorted by e.g. Genre/artist
...can be searched on criteria e.g. Genre
Chosen movie is streamed/downloaded to local entertainment device
Can be paused/rewound/fast forward. [6]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 7 1 4 8 3 2 8 6 5 7 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (ST) 113549/2
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2 and 3

A local government uses its website to provide online services for citizens.

The online services are stored on a web server situated on a protected segment of the government’s
local area network (LAN). Citizens access the services from the internet to look at information provided
by the government and to apply for official documents.

Ali is the IT manager responsible for the maintenance of the website and file server.

Ali can use his laptop to access the servers from the LAN or remotely using the internet when he
needs to carry out maintenance on the servers.

© UCLES 2016 9713/32/O/N/16


3

1 Describe the purpose of four network hardware devices that could be found on the government
LAN.

1 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

4 ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/O/N/16 [Turn over


4

2 Ali has been given a USB memory stick (pen drive) with some new information to be made
available on the website.

Describe how Ali could transfer the information from the memory stick (pen drive) to the web
server using his laptop.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

3 Explain how citizens can find and apply for official documents online when using the government
website.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2016 9713/32/O/N/16


5

BLANK PAGE

© UCLES 2016 9713/32/O/N/16 [Turn over


6

Scenario 2

Questions 4, 5 and 6

Wadz bank is used by customers for personal online banking.

Customers have accounts that can be accessed and maintained by logging into the bank’s secure
website.

Gupta works in the head office of the bank. He sometimes travels to the offices of customers to give
advice.

Gupta uses the bank’s expert system to help him when he is giving advice to customers on investments
and financial planning. He can access the expert system while in his office and via the internet while
visiting customers.

© UCLES 2016 9713/32/O/N/16


7

4 (a) Describe, in detail, the banking activities that a customer could carry out when maintaining
their account online.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The bank stores the phone number of each of its customers. Explain how the bank could use
these details to help prevent fraud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9713/32/O/N/16 [Turn over


8

5 Authentication and authorisation are used when a customer logs into an online bank account.

(a) (i) What is meant by authentication?

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) What is meant by authorisation?

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(b) Describe the authentication techniques that the bank might use with its online accounts.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/32/O/N/16


9

6 When away from the head office, Gupta needs secure access to the expert system via the internet.

Explain how Gupta could access the expert system securely via the internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/32/O/N/16 [Turn over


10

Scenario 3

Questions 7 and 8

Liene is physically disabled.

She uses her computer for online banking and online shopping.

© UCLES 2016 9713/32/O/N/16


11

7 Explain how computer hardware and software can be configured to cater for different physical
disabilities.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/O/N/16 [Turn over


12

8 Describe how a website can be configured to assist Liene when she is shopping online.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/32/O/N/16


13

BLANK PAGE

© UCLES 2016 9713/32/O/N/16 [Turn over


14

Scenario 4

Questions 9, 10, 11, 12 and 13

Kemoko is a company that produces ointments for supply to pharmacies to sell to the general public.

The company has created a new ointment for treating insect bites.

Anthea, a marketing manager, has created a leaflet to explain to the public the benefits of the new
ointment. She has created the leaflet on her computer.

Anthea has sent the draft leaflet to Mick, a marketing assistant, and asked him to thoroughly check it to
ensure that it is error-free and conforms to the company house-style.

Anthea is advertising the new ointment in the media to try and increase sales.

Anthea would also like feedback from the public. She plans to use both paper-based and online
questionnaires to gather the feedback.

© UCLES 2016 9713/32/O/N/16


15

9 (a) Describe how Mick could manually check that the leaflet is error-free.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Mick uses a spell checker to check the leaflet.

Describe how a spell checker works.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/32/O/N/16 [Turn over


16

10 Explain why the leaflet should conform to the company house-style.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/32/O/N/16


17

11 Describe and compare the ways that Anthea could advertise the new ointment in the media.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/O/N/16 [Turn over


18

12 Describe the features of an online questionnaire that make it suitable for gathering feedback from
the general public.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2016 9713/32/O/N/16


19

13 Explain why Anthea uses an online questionnaire instead of using a paper-based questionnaire.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/32/O/N/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/32/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/32


Paper 3 Written B October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

1 Eight from, max 2 per appropriate device, e.g.:

Network interface card (NIC)


...to connect to network
....to construct the data packets for transmission on the network
....to receive the data packets from the network
....to send the data packets to the network

Router
....to connect LANs into WAN
....to connect network to the internet

Switch
....to connect network segments together into a LAN
....to forward data packets to required segment of network but not all segments
....to manage packets by user programming

Hub
....to connect network segments together into a LAN
....to forward data packets to all segments of network
....a packet entering any port is forwarded/rebroadcast to all ports

Wireless access point


....to allow portable devices to connect to the LAN
....using Wi-Fi/wireless technology

Proxy server
....to act as intermediary for services requested by devices on LAN
....to enforce an acceptable use policy
....to provide language translation of resources accessed from LAN
....to act as buffer between LAN and internet for web pages accessed from LAN
....to provide network address translation (NAT) services to computers/devices on LAN

Firewall
....to prevent unauthorised access/network traffic to/from LAN by computers
....by inspecting contents of IP/data packets
...comparing contents with pre-set rules

Bridge
...connect two or more LANs together
...transfer data between two different protocols
...faster than a router at transferring data between networks as no analysis of data is done by
bridge.
[8]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

2 Four descriptions from:

Connect memory stick to laptop on network


...login to network/server/website with appropriate account/access rights...
...using e.g. FTP
...FTP is a client-server architecture
...using a secure login
...copy/upload files to folder (on website server).
[4]

3 Two explanations from:

Use search engine/facility on website to locate the application documents


Download/save/open application document
Complete and print/submit document
Login with user ID and password to Government website account.
[2]

4 (a) Four descriptions from e.g.:

Checking balance of account


Viewing bank statements
Ordering a cheque book
Paying bills to e.g. Utility companies
Transferring funds to another account/third party
Setting up regular payments to third party/another account
Viewing pending transactions
Updating/changing personal details.
[4]

(b) Two from e.g.:

Account holder mobile (cell) phone number looked up and used to send SMS/text message
to holder...
...to ensure that transactions originate from account holder
...to alert/call account holder of an irregular/unusual transaction
...when payment made from account
...details of payments/account are changed
...to alert when funds go below/above pre-set values.
[2]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

5 (a) (i) One from:

Ensuring that the person is who they say they are


Confirming that the item/data is true/genuine.
[1]
(ii) One from:

Checking that a person is allowed to do what they are trying to do


Assigning access rights/privileges to the person if they are allowed to have them.
[1]

(b) Six descriptions from:

Use of user ID with password/PIN known only to user


Use of transaction authentication numbers (TAN)
...bank creates tans for customer
...TANs sent to customer/generated by code machine held by customer seeded by PIN or by
number on screen/generated by captcha on screen/sent to cell phone of customer
...a TAN is entered after user ID/password/PIN as next level of authentication
...TAN checked against list issued to/held by customer
Use of one-time password
...multi-factor authentication with a token
...token holds unique encryption key
...token generates sequence of characters using time/unique encryption key
...bank can work out/reverse-engineer the sequence to check that key is correct one
Use of chip & PIN
Use of security questions/memorable words
Use of biometrics.
[6]

6 Six from:

Use of (virtual private network) VPN


....requires login credentials/user ID plus password
...sets up secure tunnel on public communication systems
...use of encryption
Use of authorised laptop computer/dongle
...only allow connection if computer authorised/dongle present
Access via web page using https
...web interface provided by expert system.
[6]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

7 Eight descriptions from e.g.:

Sticky keys:
By pressing two keys together, users can press the alt, control or shift key first, then the character
key afterwards

Filter keys:
Computer ignores brief key presses/where a key is pressed down repeatedly

Mouse keys:
The number pad can be configured to control the pointer on the screen

Settings:
To allow the size and appearance of the pointer, icons, text font size, menus etc. to be altered

Text to speech software that speaks the words to help the user
Speech recognition software to enable the user to speak into a microphone, the speech is
converted into text and word-processing software is used to display the text
Predictive word processors to try to guess what the user is typing
...after one or two letters are typed in, a choice of words appears on the screen and the user can
select the correct word
A mouse that can be configured to have a different type of pointer and/or leave a trail so that
people with sight problems can easily pick up where the position of the pointer
Head pointers: these use a camera positioned on top of the monitor to detect the movement of
the head through the use of reflective materials; software then converts these into the movement
of the mouse pointer
Overlay or concept keyboards: the overlay can have much larger characters that can be picked
out easily by those people with sight problems and can be selected more easily by those with
poor motor control
Purpose-built keyboards: specially manufactured keyboards, e.g. Braille keyboards for blind
people/keyboards with larger keys for those people who can see but not very well
Tracker balls: these can be used with either hands or feet
...most disabled people find they are easier to use than a mouse to control menus and pointers
Joysticks: can often respond to minor involuntary movements
...these are easier to control than a mouse
Touch screens: the idea is similar to the use of concept keyboards in that characters of the
keyboard can be larger or images can be used to replace characters
Head wand: this is a wand or rod attached to a headband that enables people with limited or no
limb movement to press the keys on a keyboard
Foot mouse: used by user’s feet instead of a hand-held mouse.

Max 6 for all hardware or all software.


[8]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

8 Six from e.g. :

Coded website with semantically meaningful HTML so visually impaired people can use text-to-
speech software and/or text-to-Braille hardware
Hard-coding of fonts etc. is avoided to allow users to adjust/configure to suit needs
Textual equivalents provided for images for visually impaired
Links named meaningfully so easy to understand
Text and images are large/enlargeable so users with poor sight can read/understand the content
Flashing effects are omitted/optional so users prone to seizures caused by these effects are not
put at risk
Distracting animations/pop-ups kept to minimum to avoid distracting visually disabled people
Clickable links and areas are large to help users who cannot precisely control a mouse
Pages are coded so that users can navigate by use of the keyboard /single switch access device
alone so users who cannot use a mouse can access the site
Links are underlined/coloured, this ensures that colour deficient users will be able to spot them
Videos are closed captioned/sign language version is available so that hearing impaired users
can understand the video.
[6]

9 (a) Two from:

Proof-reading/by reading the leaflet carefully to find errors


...to correct inaccuracies of spelling/grammar/factual accuracy.
[2]

(b) Four from:

Spell checker has a built in dictionary


Spell checker compares every word in leaflet with in-built dictionary
Spell checker highlights words which it cannot find in the dictionary
Spell checker suggests alternative spellings
Spell checker can have words added/amended in the dictionary
Spell checker can be instructed to ignore incorrect/unusual spellings
Spell checker can contain technical terms/abbreviations
If word is spelled correctly spell checker moves to next word.
[4]

10 Four from:

All documents from company must have the same look/appearance


...to present a consistent image to public
...to present corporate image
...so company can be recognised by public
More than one employee can work on the same documents to produce leaflet
...so that time taken to produce company document is reduced
...so that number of errors/mistakes/suitable example (e.g. incorrect address) is reduced.
[4]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

11 Eight from e.g.:

Web-based/online advertising using


....pop-ups on web pages to draw attention of viewer
....pop-unders on web pages to draw attention of viewer
....adverts on third party websites to attract viewers to own website
....adverts on search engine pages to direct viewers to own website
....sponsored links on web pages to direct viewers to own website

Customer-based advertising/social networking advertising


....by inserting adverts into social network streams/timelines/blogs to direct viewers to own
website

Television advertising by
....sponsorship of programmes to attract viewers attention
....product placement within programmes to put product in context/in view of watcher
....virtual advertisement(s) overlaid using computer graphics into e.g. Sports programmes to put
product in view of watcher

‘Infomercials’
....with presenters describing and displaying the product
....that give/state telephone number/website details where prospective customers can find more
information/sales

Radio advertising
....by inserting audio/spoken adverts between/in programmes

Newspaper/magazine advertising
....with printed adverts on pages
....by having mini-booklets within magazines.

Max 5 marks for all descriptions.

Additional 3 marks for valid comparisons.


[8]

12 Six from e.g.:

Drop down lists offering a choice to respondent


Radio boxes allowing only one choice to be made
Text boxes to gather free response answers/comments
Single character boxes to ensure data entry is appropriate
Validation rules to ensure that only reasonable data/comments/information is collected
....place a limit on number of characters in text boxes/in open-ended answers
Inclusion of instructions/help/FAQs available to assist in completing the form
Pop-up boxes to explain questions in more detail
Multi-lingual options for different languages
Branching logic to route participants around questions that do not apply to them
Progress bar so participants can see how far they got in questionnaire
Automatic survey/questionnaire expiry to set an end date for responses
...with re-direct to end-of survey URL/web page
Integration of answers from previous questions into new specific questions
Use of real-time survey results can be shown to participants
...in the form of a graph displayed at the end of the survey/use of questionnaire

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 32

Can send customised email(s) to participants to remind them/as a ‘thank you’/incomplete


questionnaire alert
Can send report (for analysis) on survey/use of questionnaire/answers to specific questions to
customised list of personnel
Can include a ‘forward to’ option so that participants can send the questionnaire link to others
Can be set up to prevent multiple responses from same participants
Can include an opt-out option so that participants are not repeatedly invited to complete the
questionnaire(s).
[6]

13 Eight from:

Results are available quicker than paper-based questionnaires


....analysis does not have to wait for transcription into computer system
No printing costs/wastage of paper
No need to transcribe the results into computer for analysis
....no transcription errors
More accurate because data entered directly into computer-system
...data can be exported to statistical software/spreadsheets
...data can be extracted easier
Participants can be selected/screened
....can be sent an email/text inviting participants to answer the questionnaire
More honest answers from participants
....people answer more honestly when using the internet as they feel more anonymous
More flexible because the order of questions can be changed easily
Style of questionnaire can be tailored/customised
.....images/audio/video can be added to questionnaire
Respondent can be asked different questions depending on responses to questions
Incentives can be offered for completing the questionnaire
....e.g. Money off next purchase of product.
[8]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Level
* 1 9 0 0 8 1 4 6 5 6 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No additional materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (ST/CGW) 124829
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1, 2, 3 and 4

Faster Cars is a racing car company that produces high-speed racing cars.

The company uses CAD/CAM.

The company employs engineers and mechanics to maintain the cars. It has an expert system that can
be used by the mechanics when trying to diagnose faults in the car engines.

The company has its own racing drivers who use simulators to practise high-speed racing for when
they are driving the real racing cars.

© UCLES 2016 9713/33/O/N/16


3

1 (a) Explain what is meant by CAD/CAM.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe two specialist input devices that could be used by a designer using CAD.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Describe two specialist output devices that could be used by a designer using CAD.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9713/33/O/N/16 [Turn over


4

(d) Discuss the benefits and drawbacks of using CAD.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(e) Explain why the company would choose to use CAM to produce the cars.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/33/O/N/16


5

2 When a car engine develops a fault, a mechanic will use the expert system to help diagnose the
fault.

The diagram shows an outline of the expert system that is used by the mechanic.

Inference Interface to
data from car engine
outside
Engine world

car computer system

Knowledge
car mechanic
Base

(a) Describe two inputs to the expert system from the car engine.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain the use of two output devices that could be used by the interface.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2016 9713/33/O/N/16 [Turn over


6

(c) Describe the knowledge base of the expert system and how it may be expanded.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(d) Explain how the inference engine of the expert system helps to diagnose the fault.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/O/N/16


7

3 Describe how each of the following output devices might be used in a racing car simulator.

motor

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

buzzer

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

large screen

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

loudspeaker

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2016 9713/33/O/N/16 [Turn over


8

4 Discuss the benefits and drawbacks of using computer simulations to practise driving the racing
cars.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2016 9713/33/O/N/16


9

BLANK PAGE

© UCLES 2016 9713/33/O/N/16 [Turn over


10

Scenario 2

Questions 5, 6 and 7

Floatem is a multi-national shipping company which owns a fleet of cruise ships. These ships sail to
and from ports all over the world carrying passengers on holidays.

Passengers may book holiday cruises in person at any office or online using the company’s website.

Every passenger cabin on the cruise ships is equipped with an entertainment system that can be
used to:

• listen to music from CDs


• listen to radio programmes
• listen to audio books
• access MP3 files stored on a file server
• watch video on-demand or satellite TV.

© UCLES 2016 9713/33/O/N/16


11

5 (a) Describe, including their purpose, six items of information that a customer would have to
enter when booking a holiday cruise online.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

5 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

6 ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/O/N/16 [Turn over


12

(b) Explain why a customer would prefer to book a cruise online rather than at one of the company
offices.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(c) An e-ticket and an e-receipt are issued when a booking is made online.

(i) Describe one item of information that might be shown on the e-ticket.

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

(ii) Describe one item of information that might be shown on the e-receipt. This item must be
different from the one given in (c)(i).

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[1]

© UCLES 2016 9713/33/O/N/16


13

6 (a) Describe how each of the following could be used in the entertainment system in the
passenger cabins.

(i) USB port

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Flash memory card

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Explain why MP3 files are used to distribute content to the entertainment system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/33/O/N/16 [Turn over


14

7 Kumar, a passenger, decides to use the entertainment system to watch TV in his cabin.

(a) Kumar watches a live sports programme on a satellite TV channel.

Describe how the sports programme is sent to, and received by, the entertainment system for
Kumar to watch.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/O/N/16


15

(b) Kumar watches a movie using the ship’s video on-demand system.

Explain how the ship’s video on-demand system enables Kumar to watch the movie of his
choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/33/O/N/16


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/33/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/33


Paper 3 Written B October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 6 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33

1 (a) Four from:

Computer Aided Design


....to create, modify, analyse designs

Computer Aided Manufacture


Use of (computer) software to control manufacturing machinery/tools
....to assist in all stages of the manufacturing process e.g. planning. [4]

(b) Two from e.g.:

Light pen for drawing directly on screen/when desk space is limited/might only have CRT
monitors
Trackerball for drawing when desk space is limited/less chance of picking up dust/reduced
risk of health issues/more accurate than a mouse/selecting options
Graphics tablet/use of stylus for inputting freehand drawings
Scanner for inputting hardcopy drawings/photographs/notes. [2]

(c) Two from e.g.:

CRT monitors/curved screens for several designers to see the design simultaneously
Plotter to produce large hardcopy of design drawings/blueprints
Laser printer to produce hardcopy of designs
3D-printer to produce model/prototype. [2]

(d) Six from:

Benefits:

Using CAD can be more accurate with measurements than traditional drawing methods
Using CAD can reduce human error in use of/placing components from library for the
drawings
Using CAD allows drawings to be saved/edited/modified at various stages in the process
Using CAD allows drawings to be saved/edited/modified by several designers
Using CAD allows drawings to be sent electronically to designers/email
Using CAD enables analysis of interaction of components
Using CAD enables analysis of component costs
Using CAD allows rotation/zoom of views

Drawbacks:

Using CAD requires a computer system which can be expensive/initial costs are high
Using CAD can be slower than traditional methods for one-off/low-volume production
Increased costs as workers need to be trained how to use the software and machinery.

Max 4 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion. [6]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33

(e) Four from e.g.:

The results of manufacturing using CAM are consistent (always the same)
Using CAM enables very high accuracy levels in large-scale production
CAM can produce/machine very intricate/difficult shapes
Using CAM can speed up production of low-volume products
CAM can be run for very long periods e.g. 24 hours a day, 7 days a week
Can be linked to CAD, so that designs are electronically input to machinery. [4]

2 (a) Two from:

Data about speed/from engine rotation/flywheel revolutions collected by using a light sensor
Temperature data from oil/water/exhaust systems collected by using temperature sensor
Data about pressure of coolant/oil systems collected by using a pressure sensor
Data about air/fuel ratio from exhaust gases/manifold/before and after catalytic converter
collected by using oxygen/lambda sensor
Data from the engine management system. [2]

(b) Two from:

Printer to output hardcopy of results/data/possible diagnoses


Screen/monitor to show possible diagnoses/current readings/warnings/data summaries. [2]

(c) Six from:

Consists of database of facts/car engine faults/solutions and the rules base


Holds database of knowledge from experts
...for use by inference engine
Stores unstructured and structured information
Is updated by inference engine
Using forward chaining
Existing facts are used to create new facts
Is updated by additional input of facts/knowledge from experts
New rules can be generated
User can enter new parameters/variables
Can import parameters/data from other systems. [6]

(d) Six from:

Receives data from user interface from mechanic/from car engine sensors
Checks knowledgebase for matches to data input
Checks the rules to find relevant rules that match knowledgebase facts
....using forward/backward chaining
Chooses/selects relevant rules
...prioritises rules found in knowledgebase
Executes rules in order of priority
Repeats the steps from check knowledgebase to execute rules
.....until no more matches for condition/data input
Use of if-then-else logic/action
Applies logical rules
Interprets facts in knowledgebase to provide possible diagnoses/probabilities
Suggests possible faults. [6]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33

3 One description for each:

Motor: to move whole simulator/parts of simulator/open,close valves in hydraulic rams for moving
the simulator

Buzzer: output sound/audible alert as warning/information

Large screen: display car track/ scenes/ views of road ahead

Loudspeaker: output sounds of car noises/ambient sounds/instructions from instructor. [4]

4 Eight from:

Benefits:

Drivers are not put in physical danger/can be safer/less risk of being hurt/no risk to life
Different/extreme conditions can be simulated so no need to wait for natural occurrence
Different conditions/scenarios can be repeated
Running costs/fuel consumption lower than real cars
Simulation can be recorded for later playback/analysis
...feedback can be visual overlays as well as verbal comments
...computer can objectively assess performance c.f. observations by instructor
Manoeuvres/actions can be demonstrated by the simulator
Crashed/damage to virtual cars does not cost money to repair

Drawbacks:

Can be difficult to simulate all conditions found on race tracks


Can be expensive to create a realistic simulation
Not all variables can be included in a simulation
Drivers may be more reckless in simulations because of lack of real danger
Lack of a realistic experience for drivers
...skills may not transfer from simulator to real driving
...lack of retention of skills/knowledge learned in simulator
Occurrence of ‘simulator sickness’ due to
...motion sickness where movement of body does not match what is shown on screen
...lack of smooth movement on screen during rapid changes of position
...latency between moving the steering wheel and simulator responding

Max 6 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion. [8]

5 (a) Six from e.g.:

Name for identity purposes


Address for billing purposes
Email address for confirmation of booking
Telephone number for (emergency) contact
Credit/debit/bank card details for payment
Number of passengers for accommodation/safety purposes
Ages of passengers for allocation of amenities/facilities
Number of rooms/cabins required for passenger manifest/accommodation allocation
Departure/arrival ports for itinerary
Dates of travel/cruise for logistical/booking purposes. [6]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33

(b) Six from:

No need to waste time on travel to company offices


Saves cost of travel to company offices
Can more easily compare prices of cruises/options available
Prices can be cheaper when booked online since company
Less pressure from sales people to buy extras/upgrade
Can browse with no pressure to actually book/purchase
Employs fewer staff and has lower costs
Can check availability immediately
Can get immediate confirmation of booking
Do not need to wait for tickets/details to arrive as these are sent by email. [6]

(c) (i) One from e.g.:

Barcode/matrix code with details of booking/booking reference


The official ticket number/ticket identification number
...with a check digit
Baggage allowance. [1]

(ii) One from e.g.:

MUST be different from response given in (i):


Barcode/matrix code with details of booking/booking reference
The official ticket number/ticket identification number
...with a check digit
Carriage terms and conditions
..fare and tax details/codes indicating costs
Indication of form of payment
Baggage allowance. [1]

6 (a) (i) Two from:

Upload firmware upgrades


Link via cable to other devices
Access music/video files on USB storage devices/mp3 player. [2]

(ii) Two from:

Store music/video files for playback


Record music/video files from entertainment system/use as PVR storage
Store firmware upgrades
Transfer files to/from entertainment centre. [2]

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 33

(b) Four from:

Files are compressed to save storage space/bandwidth when transferred


...loss in quality is acceptable
...can be up to 90% reduction in file-size
Standard format for music/audio files
...can be played by most devices
...entertainment system may not be able to play other audio file types/may be only audio file
type entertainment system can play
Data can be added to file
....to describe contents of file e.g. song, artist etc. [4]

7 (a) Six from:

Video and audio encoded into digital format (by camera/at studio/in outside broadcast truck)
Video/audio edited for transmission/may have short time delay introduced
Sent by cable/satellite link to studio
Sent by cable to uplink station/dish
Received by receiving dish on (geostationary) satellite
Frequency altered and sent to transponder on (geostationary) satellite
Transmitted to ground/downlinked to dish on ship
LNB on dish on ship receives signal from satellite
Signal sent to receiver via cable
Signal distributed to entertainment systems around the ship/in cabins
Receiver converts signal into viewable audio/video. [6]

(b) Six from:

Movies/video stored on servers accessed via (local) network


Kumar has direct access to files stored on server
Movie compressed to save storage space/transmission bandwidth to achieve smooth
playback/reduce lag/buffering
Kumar has a PIN required to view movie
Each cabin has set-top box/receiver required
Menu/list of movies shown on screen
...can be sorted by e.g. Genre/artist
...can be searched on criteria e.g. Genre
Chosen movie is streamed/downloaded to local entertainment device
Can be paused/rewound/fast forward. [6]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 3 7 8 5 2 1 3 5 5 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 19 printed pages and 1 blank page.

DC (LEG) 115296/4
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

Didier is a student who is studying for his A levels. He attends Montmartre College.

When he is at college he uses the college’s computer network in order to do his coursework.

When he is at home he uses his own laptop to continue work that he did not manage to complete at
college.

Didier needs to take weather readings for a month as part of his Geography coursework. He will then
have to write a report of his findings.

Didier uses the internet to find some information about the climate during the previous eleven months
for his report.

© UCLES 2016 9713/11/O/N/16


3

1 (a) Name four storage devices which Didier or the college could use. For each device give a
different use.

Device 1 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 2 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 3 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 4 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/11/O/N/16 [Turn over


4

(b) Describe how Didier will use each of the following types of software to prepare his Geography
report. Each use must be different.

(i) Spreadsheet:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Database:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Web Browser:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/11/O/N/16


5

(c) Describe how Didier can find relevant pages on the internet related to his Geography
coursework.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/11/O/N/16 [Turn over


6

2 Didier has found the ideal website for his needs. It provides the data that he wants in the form of a
.csv file.

Three file types are shown on the left along with six descriptions on the right.

Draw six lines (2 from each file type) to connect each file type to its most appropriate descriptions.

Each description can only be used once.

File contains no formatting information

.csv file
Allows user to choose different fonts and effects

Distinct data items are separated by commas

.rtf file

File used for transferring data between spreadsheets

File contains text mixed with tags which are used to turn
effects on and off
.txt file

Can be opened by all word processors

[4]

© UCLES 2016 9713/11/O/N/16


7

Scenario 2

Questions 3 and 4

Kwikshop is a supermarket company which has a number of branches across the country. It uses
computer technology at checkouts in all its supermarkets. Barcode scanners are used to input data
from goods purchased by customers. Smart card readers are used to allow customers to complete
their transactions.

The management of Kwikshop is aware of new technology that will allow customers to pay at the
checkout without entering their card into the chip and pin machine. They would like to introduce this
contactless technology throughout their stores.

The management of Kwikshop have recently introduced an online shopping system. Customers provide
a list of goods that they require on the supermarket company’s website and pay electronically. The
goods are later delivered to their home.

© UCLES 2016 9713/11/O/N/16 [Turn over


8

3 (a) Each item on sale in the supermarket has a barcode printed on it.

5 0 1 2 3 4 5 6 1 2 3 4 5
(i) Explain why the bars on the barcode are different widths.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe what the digits stand for and why they are necessary.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/11/O/N/16


9

(iii) Explain how the data collected from the barcodes at the checkout is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[6]

© UCLES 2016 9713/11/O/N/16 [Turn over


10

(b) Rosef, a systems analyst, has been employed to oversee the introduction of the new
contactless system.

Describe each of the following methods of implementation that Rosef could use and explain
how each could be used in the supermarket to introduce the new system.

Parallel running:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Direct changeover:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Pilot running:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/11/O/N/16


11

(c) Rosef will need to provide documentation for the checkout operators using the contactless
payment system and for the administration staff of the supermarket.

Explain the need for user documentation specifically for the contactless payment system in
Kwikshop.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/11/O/N/16 [Turn over


12

4 (a) Describe the benefits and drawbacks of this new online shopping system for the customers of
Kwikshop.

Benefits .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Drawbacks ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) (i) Describe three different measures that the workers can take to overcome
computer-related health problems. Each problem must be different.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9713/11/O/N/16


13

(ii) Customers depend on the supermarket using their data correctly.

Explain what is meant by each of the following security/privacy measures:

Aggregated information:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Data protection legislation:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Duty of confidence:

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9713/11/O/N/16 [Turn over


14

Scenario 3

Question 5

Modeast hospital has an intensive care ward. The patients in each of the six beds in the intensive care
ward are monitored by a computer system.

© UCLES 2016 9713/11/O/N/16


15

5 (a) Explain how the computer system can be used in the intensive care unit of the hospital.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Describe two forms of output that the system will produce and explain why each is necessary.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/11/O/N/16 [Turn over


16

Scenario 4

Question 6

Homedec is a company that sells items for decorating homes.

Homedec is bringing out a new range of products designed to decorate bathrooms.

The workers who are employed in the stores are offered a number of different working patterns so that
Homedec can increase its opening hours.

© UCLES 2016 9713/11/O/N/16


17

6 (a) Name and describe three different working patterns that would be appropriate for workers in
the stores. For each working pattern describe a different benefit to the workers in Homedec.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/11/O/N/16 [Turn over


18

(b) Workers at the stores are paid a bonus each month. Workers’ pay, bonuses and methods of
payment are stored in a spreadsheet, part of which is shown here.

A B C D E F G H I
Pay per
1 ID Hours hour Bonus Final Wage
2 216 16 $23.25 Blue =B2*C2+(VLOOKUP(D2,$G$2:$I$4,3,FALSE)) Blue $5.00
3 233 22 $16.95 Blue Silver $10.00
4 243 45 $22.75 Silver Gold $15.00
5 257 45 $15.85 Gold
6 261 16 $16.85 Silver

Explain the formula which is in cell E2.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/11/O/N/16


19

(c) Homedec needs to advertise its new range of products.


Discuss the ICT methods that can be used to advertise the products in the new bathroom
range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2016 9713/11/O/N/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/11/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/11


Paper 1 Written A October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

1 (a) Four from:

Fixed hard disk drive used to store software/OS/students’ work


Portable hard disk drive used to transport large files between home and college/to make
backup copies of files
Magnetic tape cartridge readers used to store backup of course work/software by college
network manager
DVD writer/reader to store videos of coursework
CD writer/reader used to store audio of student’s work
DVD/CD writer/reader to make permanent backup copies of files/to transport coursework
between home and college/to import files/software to system
Memory stick/pen drive/flash drive/disk/memory card to make backup copies of files/to
transport coursework between home and college
Solid State Drive used to store software/student’s work
[4]

(b) (i) Spreadsheet:


Two from:

To enter/store weather data/readings taken (over the course of the month)…


…such as rainfall, temperature against time
To produce graphs of weather data…
…such as rainfall, temperature against time
To perform automatic calculations on weather data…
... to produce mean values of rainfall/temperature/calculate range of temperatures
To model weather data…
…to produce predictions of future weather patterns [2]

(ii) Database:
Two from:

To enter/store weather readings taken (over the course of the month)…


…such as rainfall, temperature against time
To manipulate the data into groups…
…such as days of sunshine exceeding certain number of hours/rainfall less than a
certain amount
To create filters/queries to produce reports on weather readings…
…such as days in the month with no rainfall
To produce graphs of weather data……
…such as rainfall, temperature against time
To perform automatic calculations on weather data… [2]
... to produce mean values of rainfall/temperature/calculate range of temperatures
To produce summaries…
…such as the wettest week of the month/warmest week of the month

(iii) Web browser:


Two from:

To allow Didier to search the internet for weather data…


…to find images to paste into his coursework…
…so that his readings can be compared with existing data
Allows him to access his email account…
…so that he can send weather data to college/home via email
[2]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

(c) Six from:

Type a specific URL into the address bar


Click on hyperlink from a relevant webpage
Use a search engine (to make a query)…
…type in ‘climate’/’weather’ into the search engine
Use Boolean operators to narrow down /widen his search
Use speech marks to narrow down his search
Use wildcards to narrow down his search [6]

2
File contains no formatting information

.csv file
Allows user to choose different fonts and effects

.rtf file Distinct data items are separated by commas

File used for transferring data between


.txt file spreadsheets

File contains text mixed with tags which are used


to turn effects on and off

Can be opened by all word processors

6 lines correct give 4 marks.


5 lines correct give 3 marks
3 or 4 lines correct give 2 marks
1 or 2 lines correct give 1 mark
0 lines correct give 0 marks [4]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

3 (a) (i) Two from:

Combinations of the different widths stand for different digits


There are a specific number of different widths used
Pairs of bars and the associated gaps between them are used to represent the digits
The outside bars are used to inform the computer when the barcode starts and stops
and in which direction it is being read
[2]
(ii) Two from:

Represent the ID number of the item being scanned


Allows the details of the item to be found in the stock database
Necessary in case the bar code will not read properly
[2]
(iii) Six from:

Data can be used to provide itemised receipt for customer


Rate at which barcodes are read can provide management information about
performance of checkout workers
Data can be used to provide automatic stock control/keeps accurate records of stock
levels
Provides up to date number of items in stock
Provides information of popularity or otherwise of stock items
Provides advice about ordering
Can be used to automatically trigger orders for some stock items
Product number is looked up in stock file/checks if product exists in database
Price is read from product number in stock file/displayed on screen
Name/description of product is read from stock file/displayed on screen
Reduces number in stock by quantity purchased [6]

(b) Six from:

Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]

Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]

Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

(c) Four from:

The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash

4 (a) Four from:

Benefits:

Can compare products and prices at their leisure


Can shop at a convenient time for them/24/7
Customers can shop at their favourite store even when they live far away
Customers don’t have to spend time travelling to shop
Customers don’t have to spend money travelling to shop
Disabled customers will find it easier than travelling to shop
There will be a greater choice of goods
Don’t have to spend time queuing

Drawbacks:

Disabled people may have problems navigating through screens


Customers who do not have a credit/debit card will not be able to use online shopping
Security concerns about data transmitted over internet such as hacking, phishing, pharming,
spyware, viruses, malware (must have two)
Description of phishing
Description of pharming
Can order goods and they don't get delivered
Goods are not to the same standard as those ordered/wrong goods delivered/substitute
goods delivered
Can’t check the standard of goods before buying/can’t be sure the goods are in stock
May be hidden costs such as delivery charges
Description of viruses
Expense of buying a computer with a broadband internet connection/must have a reliable
electricity supply/basic computer skills
[4]
Must have at least one of each to gain full marks

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

(b) (i) Three from:

Headaches– ensure that monitor is at the correct height/distance/position/focus on


distant objects from time to time/take regular breaks and walk around/use screen filter

Eyesight problems- ensure that monitor is at the correct height/distance/position/focus


on distant objects from time to time/take regular breaks and walk around/use screen filter

RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard

RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time

Back/neck problems – maintain good posture/sit in a straight backed chair/sit in a height


adjustable chair/ensure that monitor is at the correct height

Deep vein thrombosis – take regular breaks and walk around [3]

(ii) Aggregated information:


In the reports data is combined and no individual is identified [1]

Data Protection legislation:


Legally binding rules/laws governing the use of personal data [1]

Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]

5 (a) Six from:

Patient’s condition is monitored using microprocessor/computer and sensors


Sensors/computers used to monitor blood pressure, pulse rate, body temperature, Oxygen
level in blood, blood sugar (must mention at least two)
Sensors feed back body functions to the microprocessor/computer
Readings can be taken at predetermined time intervals
Computer is pre-set with the normal range of values
Computer is (constantly) comparing the data fed back by the sensors…
…..to these pre-set values
If any data is outside the pre-set range the computer (sends a signal to) sound an alarm/
increase dose of a drug
Data readings are stored on computer system for doctors to use later when visiting
recovering patients
[6]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

(b) Two matched pairs from:

Graphical/numerical output of patient’s readings/condition…


…can be seen/give an indication of condition from a distance so nurse can glance at each
patient monitor quickly

Hard copy printout of results/patient’s condition over a specific period…


…to allow doctor to analyse changes in condition after the event/shows trends/can be taken
away for later checking

Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded

Heart monitor beeping…


…regular beeping to indicate normal heart beat/continuous beeping to alert doctors/nurses to
problem
[4]

6 (a) Three matched pairs from:

Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family

Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family

Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day

Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]

(b) Six from:

Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 11

(c) Eight from:

Website created/produced using web authoring software


A cheap form of advertising nationally and internationally/can advertise to a very large
audience
More expensive initially to have own website – web designer has to be employed
Can produce a website to own specification
Website has more features than most other forms
Has range of multimedia – sound, video/animation, (text, images)
Can have hyperlinks to other sites/pages
Can advertise on other people's websites
Cheaper than using own site
Banners/pop ups/pop unders can be used
Pop-up grabs user's attention
Can upset users who then do not shop there in future
Users have pop-up blocking software which doesn’t allow pop-ups to appear
Can use pop-unders which are not removed by pop-up blocking
Can advertise their name by getting it included in an online directory

(Multimedia) presentations/slide show used on purpose-built display monitors…


…placed in strategic locations
The presentation/slide show is produced using presentation software
Has range of multimedia – sound, video/animation, (text, images)
Other features e.g. slide transition effects, special text effects, image transition
Always on while mall or store is open
The user cannot switch it off
Quicker to update than an internet site or television commercial

Flyers created using DTP software/word processing software


Used by individuals or small businesses
Used to advertise in the local community therefore have limited impact
Can be produced using own PCs and printers
For larger print runs have to take to the printers – increased costs
Quick to produce
DTP allows character shapes, variety of patterns, colours
Can be distributed to target audience
Limited to local audiences

Posters produced using word-processing/desktop-publishing/presentation software


Due to size have to be printed by professional printers – expensive
More usually, presentation because of ability to use very large paper sizes
Limited exposure due to position of site/static display
Posters are more eye catching than fliers
Can be placed in strategic positions

E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge

Must have more than one method to gain full marks [8]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 2 1 2 0 1 0 2 3 9 *

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 October/November 2016
1 hour 15 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in blue or black pen.
Do not use staples, paper clips, glue or correction fluid.
You may use an HB pencil for any diagrams, graphs or rough working.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

The number of marks is given in brackets [ ] at the end of each question or part question.

The businesses described in this paper are entirely fictitious.

This document consists of 19 printed pages and 1 blank page.

DC (TN) 131305
© UCLES 2016 [Turn over
2

Scenario 1

Questions 1 and 2

Didier is a student who is studying for his A levels. He attends Montmartre College.

When he is at college he uses the college’s computer network in order to do his coursework.

When he is at home he uses his own laptop to continue work that he did not manage to complete at
college.

Didier needs to take weather readings for a month as part of his Geography coursework. He will then
have to write a report of his findings.

Didier uses the internet to find some information about the climate during the previous eleven months
for his report.

© UCLES 2016 9713/12/O/N/16


3

1 (a) Name four storage devices which Didier or the college could use. For each device give a
different use.

Device 1 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 2 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 3 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Device 4 ....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/12/O/N/16 [Turn over


4

(b) Describe how Didier will use each of the following types of software to prepare his Geography
report. Each use must be different.

(i) Spreadsheet:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Database:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Web Browser:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/12/O/N/16


5

(c) Describe how Didier can find relevant pages on the internet related to his Geography
coursework.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/12/O/N/16 [Turn over


6

2 Didier has found the ideal website for his needs. It provides the data that he wants in the form of a
.csv file.

Three file types are shown on the left along with six descriptions on the right.

Draw six lines (2 from each file type) to connect each file type to its most appropriate descriptions.

Each description can only be used once.

File contains no formatting information

.csv file
Allows user to choose different fonts and effects

Distinct data items are separated by commas

.rtf file

File used for transferring data between spreadsheets

File contains text mixed with tags which are used to turn
effects on and off
.txt file

Can be opened by all word processors

[4]

© UCLES 2016 9713/12/O/N/16


7

Scenario 2

Questions 3 and 4

Kwikshop is a supermarket company which has a number of branches across the country. It uses
computer technology at checkouts in all its supermarkets. Barcode scanners are used to input data
from goods purchased by customers. Smart card readers are used to allow customers to complete
their transactions.

The management of Kwikshop is aware of new technology that will allow customers to pay at the
checkout without entering their card into the chip and pin machine. They would like to introduce this
contactless technology throughout their stores.

The management of Kwikshop have recently introduced an online shopping system. Customers provide
a list of goods that they require on the supermarket company’s website and pay electronically. The
goods are later delivered to their home.

© UCLES 2016 9713/12/O/N/16 [Turn over


8

3 (a) Each item on sale in the supermarket has a barcode printed on it.

5 0 1 2 3 4 5 6 1 2 3 4 5
(i) Explain why the bars on the barcode are different widths.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Describe what the digits stand for and why they are necessary.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

© UCLES 2016 9713/12/O/N/16


9

(iii) Explain how the data collected from the barcodes at the checkout is used.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[6]

© UCLES 2016 9713/12/O/N/16 [Turn over


10

(b) Rosef, a systems analyst, has been employed to oversee the introduction of the new
contactless system.

Describe each of the following methods of implementation that Rosef could use and explain
how each could be used in the supermarket to introduce the new system.

Parallel running:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Direct changeover:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Pilot running:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/12/O/N/16


11

(c) Rosef will need to provide documentation for the checkout operators using the contactless
payment system and for the administration staff of the supermarket.

Explain the need for user documentation specifically for the contactless payment system in
Kwikshop.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/12/O/N/16 [Turn over


12

4 (a) Describe the benefits and drawbacks of this new online shopping system for the customers of
Kwikshop.

Benefits .....................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Drawbacks ................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) (i) Describe three different measures that the workers can take to overcome
computer-related health problems. Each problem must be different.

1 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

2 ........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

3 ........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9713/12/O/N/16


13

(ii) Customers depend on the supermarket using their data correctly.

Explain what is meant by each of the following security/privacy measures:

Aggregated information:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Data protection legislation:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

Duty of confidence:

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2016 9713/12/O/N/16 [Turn over


14

Scenario 3

Question 5

Modeast hospital has an intensive care ward. The patients in each of the six beds in the intensive care
ward are monitored by a computer system.

© UCLES 2016 9713/12/O/N/16


15

5 (a) Explain how the computer system can be used in the intensive care unit of the hospital.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Describe two forms of output that the system will produce and explain why each is necessary.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2016 9713/12/O/N/16 [Turn over


16

Scenario 4

Question 6

Homedec is a company that sells items for decorating homes.

Homedec is bringing out a new range of products designed to decorate bathrooms.

The workers who are employed in the stores are offered a number of different working patterns so that
Homedec can increase its opening hours.

© UCLES 2016 9713/12/O/N/16


17

6 (a) Name and describe three different working patterns that would be appropriate for workers in
the stores. For each working pattern describe a different benefit to the workers in Homedec.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/12/O/N/16 [Turn over


18

(b) Workers at the stores are paid a bonus each month. Workers’ pay, bonuses and methods of
payment are stored in a spreadsheet, part of which is shown here.

A B C D E F G H I
Pay per
1 ID Hours hour Bonus Final Wage
2 216 16 $23.25 Blue =B2*C2+(VLOOKUP(D2,$G$2:$I$4,3,FALSE)) Blue $5.00
3 233 22 $16.95 Blue Silver $10.00
4 243 45 $22.75 Silver Gold $15.00
5 257 45 $15.85 Gold
6 261 16 $16.85 Silver

Explain the formula which is in cell E2.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2016 9713/12/O/N/16


19

(c) Homedec needs to advertise its new range of products.


Discuss the ICT methods that can be used to advertise the products in the new bathroom
range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2016 9713/12/O/N/16


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every reasonable
effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the publisher will
be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2016 9713/12/O/N/16


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

APPLIED INFORMATION AND COMMUNICATION TECHNOLOGY 9713/12


Paper 1 Written A October/November 2016
MARK SCHEME
Maximum Mark: 80

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the October/November 2016 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is the registered trademark of Cambridge International Examinations.

This document consists of 8 printed pages.

© UCLES 2016 [Turn over


Page 2 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

1 (a) Four from:

Fixed hard disk drive used to store software/OS/students’ work


Portable hard disk drive used to transport large files between home and college/to make
backup copies of files
Magnetic tape cartridge readers used to store backup of course work/software by college
network manager
DVD writer/reader to store videos of coursework
CD writer/reader used to store audio of student’s work
DVD/CD writer/reader to make permanent backup copies of files/to transport coursework
between home and college/to import files/software to system
Memory stick/pen drive/flash drive/disk/memory card to make backup copies of files/to
transport coursework between home and college
Solid State Drive used to store software/student’s work
[4]

(b) (i) Spreadsheet:


Two from:

To enter/store weather data/readings taken (over the course of the month)…


…such as rainfall, temperature against time
To produce graphs of weather data…
…such as rainfall, temperature against time
To perform automatic calculations on weather data…
... to produce mean values of rainfall/temperature/calculate range of temperatures
To model weather data…
…to produce predictions of future weather patterns [2]

(ii) Database:
Two from:

To enter/store weather readings taken (over the course of the month)…


…such as rainfall, temperature against time
To manipulate the data into groups…
…such as days of sunshine exceeding certain number of hours/rainfall less than a
certain amount
To create filters/queries to produce reports on weather readings…
…such as days in the month with no rainfall
To produce graphs of weather data……
…such as rainfall, temperature against time
To perform automatic calculations on weather data… [2]
... to produce mean values of rainfall/temperature/calculate range of temperatures
To produce summaries…
…such as the wettest week of the month/warmest week of the month

(iii) Web browser:


Two from:

To allow Didier to search the internet for weather data…


…to find images to paste into his coursework…
…so that his readings can be compared with existing data
Allows him to access his email account…
…so that he can send weather data to college/home via email
[2]

© UCLES 2016
Page 3 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Six from:

Type a specific URL into the address bar


Click on hyperlink from a relevant webpage
Use a search engine (to make a query)…
…type in ‘climate’/’weather’ into the search engine
Use Boolean operators to narrow down /widen his search
Use speech marks to narrow down his search
Use wildcards to narrow down his search [6]

2
File contains no formatting information

.csv file
Allows user to choose different fonts and effects

.rtf file Distinct data items are separated by commas

File used for transferring data between


.txt file spreadsheets

File contains text mixed with tags which are used


to turn effects on and off

Can be opened by all word processors

6 lines correct give 4 marks.


5 lines correct give 3 marks
3 or 4 lines correct give 2 marks
1 or 2 lines correct give 1 mark
0 lines correct give 0 marks [4]

© UCLES 2016
Page 4 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

3 (a) (i) Two from:

Combinations of the different widths stand for different digits


There are a specific number of different widths used
Pairs of bars and the associated gaps between them are used to represent the digits
The outside bars are used to inform the computer when the barcode starts and stops
and in which direction it is being read
[2]
(ii) Two from:

Represent the ID number of the item being scanned


Allows the details of the item to be found in the stock database
Necessary in case the bar code will not read properly
[2]
(iii) Six from:

Data can be used to provide itemised receipt for customer


Rate at which barcodes are read can provide management information about
performance of checkout workers
Data can be used to provide automatic stock control/keeps accurate records of stock
levels
Provides up to date number of items in stock
Provides information of popularity or otherwise of stock items
Provides advice about ordering
Can be used to automatically trigger orders for some stock items
Product number is looked up in stock file/checks if product exists in database
Price is read from product number in stock file/displayed on screen
Name/description of product is read from stock file/displayed on screen
Reduces number in stock by quantity purchased [6]

(b) Six from:

Parallel running:
The old and new systems are run at the same time [1]
Both the chip and pin payment system and the contactless system are run together until the
contactless system has no bugs [1]

Direct changeover:
The new system replaces the old system immediately [1]
All the chip and pin machines are removed in one go and the new contactless system is
installed ready for the store to open the following day [1]

Pilot running
The new system is run in one branch of the organisation [1]
The contactless system is used in only one supermarket until it has been fully tested/before
being rolled out to other supermarkets [1]

© UCLES 2016
Page 5 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Four from:

The users will not be familiar with the new technology and must therefore be given
instructions
User documentation is less time consuming/expensive than Rosef training them
The staff will need to be able to give assistance to customers and explain how to use it
Staff may need to consult FAQs/documentation if they/customers have problems
The documentation is permanently available meaning that Rosef will not need to be
consulted every time a problem occurs
The documentation will include a troubleshooting guide for future reference
May need to be able to restart the system if there is a system crash

4 (a) Four from:

Benefits:

Can compare products and prices at their leisure


Can shop at a convenient time for them/24/7
Customers can shop at their favourite store even when they live far away
Customers don’t have to spend time travelling to shop
Customers don’t have to spend money travelling to shop
Disabled customers will find it easier than travelling to shop
There will be a greater choice of goods
Don’t have to spend time queuing

Drawbacks:

Disabled people may have problems navigating through screens


Customers who do not have a credit/debit card will not be able to use online shopping
Security concerns about data transmitted over internet such as hacking, phishing, pharming,
spyware, viruses, malware (must have two)
Description of phishing
Description of pharming
Can order goods and they don't get delivered
Goods are not to the same standard as those ordered/wrong goods delivered/substitute
goods delivered
Can’t check the standard of goods before buying/can’t be sure the goods are in stock
May be hidden costs such as delivery charges
Description of viruses
Expense of buying a computer with a broadband internet connection/must have a reliable
electricity supply/basic computer skills
[4]
Must have at least one of each to gain full marks

© UCLES 2016
Page 6 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(b) (i) Three from:

Headaches– ensure that monitor is at the correct height/distance/position/focus on


distant objects from time to time/take regular breaks and walk around/use screen filter

Eyesight problems- ensure that monitor is at the correct height/distance/position/focus


on distant objects from time to time/take regular breaks and walk around/use screen filter

RSI – carpal tunnel syndrome – ensure that regular finger exercises are practised/take
regular breaks/use wrist supports/use trackerballs/ergonomic keyboard

RSI – cubital tunnel syndrome – keep forearms horizontal when using keyboard/take
regular breaks/place arms at your side straight down from time to time

Back/neck problems – maintain good posture/sit in a straight backed chair/sit in a height


adjustable chair/ensure that monitor is at the correct height

Deep vein thrombosis – take regular breaks and walk around [3]

(ii) Aggregated information:


In the reports data is combined and no individual is identified [1]

Data Protection legislation:


Legally binding rules/laws governing the use of personal data [1]

Duty of confidence:
Workers must not disclose/share personal/customer data to a third party [1]

5 (a) Six from:

Patient’s condition is monitored using microprocessor/computer and sensors


Sensors/computers used to monitor blood pressure, pulse rate, body temperature, Oxygen
level in blood, blood sugar (must mention at least two)
Sensors feed back body functions to the microprocessor/computer
Readings can be taken at predetermined time intervals
Computer is pre-set with the normal range of values
Computer is (constantly) comparing the data fed back by the sensors…
…..to these pre-set values
If any data is outside the pre-set range the computer (sends a signal to) sound an alarm/
increase dose of a drug
Data readings are stored on computer system for doctors to use later when visiting
recovering patients
[6]

© UCLES 2016
Page 7 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(b) Two matched pairs from:

Graphical/numerical output of patient’s readings/condition…


…can be seen/give an indication of condition from a distance so nurse can glance at each
patient monitor quickly

Hard copy printout of results/patient’s condition over a specific period…


…to allow doctor to analyse changes in condition after the event/shows trends/can be taken
away for later checking

Buzzer/Sound/light alarm…
…in order to instantly attract attention if patient change may need immediate action/to alert
doctors/nurses if preset values exceeded

Heart monitor beeping…


…regular beeping to indicate normal heart beat/continuous beeping to alert doctors/nurses to
problem
[4]

6 (a) Three matched pairs from:

Job sharing – Two (or more) workers doing the job of one worker (working full time)
Allows workers to accept other commitments/can spend more time with family

Part time working – Working a limited number of hours/ working less than the normal working
hours of a full time employee
Allows workers to accept other commitments/can spend more time with family

Flexible working hours – Workers choose the time of day they want to work (but work the
same number of hours every week)
Can organise their working lives to suit their personal needs/Can choose to work off peak
hours as travelling to work outside peak times is easier and cheaper/If workers stay late to
finish a job, they can take time off at a later date/If the job requires great concentration, it can
be done at quiet times of day

Compressed hours – Working for same number of hours as a normal working week but over
fewer days
Earn the same amount of money but work fewer days/They can have long weekends by
finishing early on Fridays or not working Fridays/Travel to work fewer days so less time spent
travelling/Travel to work fewer days so less money spent travelling
[6]

(b) Six from:

Calculates the final wage after applying a bonus for each worker
Multiplies the number of hours worked/B2 by the pay per hour/C2…
… and adds the bonus to be paid
VLOOKUP is used to search the lookup table of bonuses/check which bonus is to be paid/in
the range G2 to G4/I4…
…until a match to the value in cell D2 is found…
…the resulting value is added
Needs to be an exact match because of the ‘FALSE’ part of the formula
The ‘3’ instructs that when a match is made then the appropriate value is read from the third
column of the lookup table
Contents of E2 = 377 [6]

© UCLES 2016
Page 8 Mark Scheme Syllabus Paper
Cambridge International AS/A Level – October/November 2016 9713 12

(c) Eight from:

Website created/produced using web authoring software


A cheap form of advertising nationally and internationally/can advertise to a very large
audience
More expensive initially to have own website – web designer has to be employed
Can produce a website to own specification
Website has more features than most other forms
Has range of multimedia – sound, video/animation, (text, images)
Can have hyperlinks to other sites/pages
Can advertise on other people's websites
Cheaper than using own site
Banners/pop ups/pop unders can be used
Pop-up grabs user's attention
Can upset users who then do not shop there in future
Users have pop-up blocking software which doesn’t allow pop-ups to appear
Can use pop-unders which are not removed by pop-up blocking
Can advertise their name by getting it included in an online directory

(Multimedia) presentations/slide show used on purpose-built display monitors…


…placed in strategic locations
The presentation/slide show is produced using presentation software
Has range of multimedia – sound, video/animation, (text, images)
Other features e.g. slide transition effects, special text effects, image transition
Always on while mall or store is open
The user cannot switch it off
Quicker to update than an internet site or television commercial

Flyers created using DTP software/word processing software


Used by individuals or small businesses
Used to advertise in the local community therefore have limited impact
Can be produced using own PCs and printers
For larger print runs have to take to the printers – increased costs
Quick to produce
DTP allows character shapes, variety of patterns, colours
Can be distributed to target audience
Limited to local audiences

Posters produced using word-processing/desktop-publishing/presentation software


Due to size have to be printed by professional printers – expensive
More usually, presentation because of ability to use very large paper sizes
Limited exposure due to position of site/static display
Posters are more eye catching than fliers
Can be placed in strategic positions

E-mail to customers
Use of attachments may dissuade customers from reading the advertisement
Customers may treat it as junk mail and so not read it
Specific customers can be targeted
Attachment can be created easily using DTP
DTP allows character shapes, variety of patterns, colours
Can be sent to world wide audience
Easy to create an email and mailmerge

Must have more than one method to gain full marks [8]

© UCLES 2016
Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 0 5 3 1 1 9 3 9 8 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (LK) 133330/4
© UCLES 2017 [Turn over
2

1 Tick the four true statements referring to the use of data types when creating a database.

Boolean is a data type representing either of two states.

Text fields cannot contain numbers.

Numeric fields cannot contain text.

Integer is a numeric data type used for storing decimal numbers.

Date is a data type which can be used for storing images.

The real number data type is used for fields containing whole numbers only.

The numeric data type can be subdivided into different types of number.

The alphanumeric data type can contain punctuation marks.

The text data type is the easiest type of data to validate.

Currency must be stored as text.


[4]

2 Tick the four true statements relating to the use of normalisation when organising the attributes
and tables of a relational database.

A table that has not got a unique key can still be in first normal form.
Normalisation does not attempt to eliminate storing the same data in more than one
table.
Normalisation involves breaking down a table into less redundant, smaller tables.

A table is in first normal form if it contains no repeating groups.


A table is in second normal form if it is in first normal form and, additionally, does
not have a composite primary key.
A table in first normal form must use all the relationships, one-to-one, one-to-many
and many-to-one.
A database is in third normal form if it is in second normal form and each table has
no non-key attributes that depend upon other non-key attributes.
A third normal form table can still have non-key attributes dependent on other
non-key attributes.
Third normal form tables can still have non-key fields that do not depend on the
primary key.
Every table in a relational database must have a foreign key.
[4]

© UCLES 2017 9626/13/M/J/17


3

3 A CD-ROM encyclopaedia is considered to be a static information source whereas a website


encyclopaedia is considered to be a dynamic information source.

Explain the differences between static and dynamic information sources.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/13/M/J/17 [Turn over


4

4 Sheila has just become manager of the ticketing department in an airport. She uses computers to
accept payments and check passengers’ passports.

(a) Evaluate the input devices which Sheila might use, including their specific use in this system.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2017 9626/13/M/J/17


5

(b) Sheila stores all the records of her transactions and lists of passengers from each flight on a
hard disk. She is considering replacing her hard disk drive with a solid state drive (SSD).
Evaluate the use of a hard disk drive compared with an SSD.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2017 9626/13/M/J/17 [Turn over


6

5 Below is an extract from a spreadsheet showing the wages paid in one week to a group of workers.
Any hours worked over 40 count as overtime. Overtime is paid at 1.5 times the normal rate.

A B C D E F G H
1
Overtime
Hours worked Hours overtime Rate per hour Wage paid this
Worker’s name Job type earned this
this week worked paid week
2 week
3
4 Johan Braun Labourer 45 5 $13.00 $97.50 $617.50
5 Lisa Moran Skilled 40 $18.00 $720.00
6 Chi Li Labourer 40 $13.00 $520.00
7 Susan Armstrong Labourer 46 6 $13.00 $117.00 $637.00
8 Luqman Hisham Labourer 39 $13.00 $507.00
9 Kanda Demir Semi-skilled 40 $15.50 $620.00
10 Paul Strong Labourer 43 3 $13.00 $58.50 $578.50
11 Shoba Purushothaman Semi-skilled 48 8 $15.50 $186.00 $806.00
12 Kulap Kaya Semi-skilled 40 $15.50 $620.00
13 Tony Fernandes Skilled 40 $18.00 $720.00
14 Halim Saad Semi-skilled 51 11 $15.50 $255.75 $875.75
15
Workers working
16 overtime 5
17

(a) Write down the formula which should be used in cell C16 in order to display the number of
workers who worked overtime.

= ................................................................................................................................................

...............................................................................................................................................[4]

You can use the space below for any working you need.

© UCLES 2017 9626/13/M/J/17


7

(b) Write down the formula which should be used in cell D4 in order to display the number of
Hours overtime worked for Johan Braun. The formula should be in a form that can be easily
replicated and should leave the cell blank if no overtime has been worked.

= ................................................................................................................................................

...............................................................................................................................................[5]

You can use the space below for any working you need.

(c) Write down the formula which should be used in cell F4 in order to display the amount of
money earned for working overtime for Johan Braun. The formula should be in a form that
can be easily replicated and should leave the cell blank if no overtime has been worked.

= ................................................................................................................................................

...............................................................................................................................................[5]

You can use the space below for any working you need.

© UCLES 2017 9626/13/M/J/17 [Turn over


8

6 In a recent BBC news bulletin it was reported:

The BBC has obtained exclusive figures from the financial ombudsman that show there have
been nearly 100 complaints about “vishing” in the past three months.

Describe what is meant by:

(i) phishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(ii) vishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/13/M/J/17


9

7 Many people use computers to access services provided by the internet.

(a) Explain what is meant by the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe six of the services that are provided by the internet.

1. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

4. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

5. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

6. ...............................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/13/M/J/17 [Turn over


10

8 A recording company has produced a video of one of its famous singers. The video has been
given to John to edit so that it will have a fully professional look. The soundtrack has been sent
separately to the video file.
Describe how John would use the following features of video editing software.

Trimming ..........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Adding sound ...................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Adding captions ...............................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/13/M/J/17


11

9 Bruce works from home but is able to access company data using a virtual private network (VPN).

Describe the benefits and drawbacks for Bruce of using a VPN.

Benefits ............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Drawbacks .......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/13/M/J/17 [Turn over


12

10 A school marks all its exams out of 100.


It has recently introduced a system of positive marking for students in years 12 and 13 whereby
students will be awarded 10 marks for just sitting the exam and then, as normal, will be awarded
further marks for correct answers.
After the papers have been marked, the school secretary will enter the marks into a student
database together with the year the student is in and their date of birth, which must be entered in
the form dd/mm/yyyy. It is acceptable for data to be omitted for certain students.

Apart from type check or length check, describe four different validation checks which should be
carried out on the data to help prevent mistakes occurring.

1. ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2. ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3. ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

4. ......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/13/M/J/17


13

11 A manager of a small business wants to update her computer system. When considering which
software to use, she has to choose between custom written software and off-the-shelf software.

Describe what is meant by these two types of software.

(a) Custom written:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Off-the-shelf:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/13/M/J/17 [Turn over


14

12 Below is part of a spreadsheet Deirdre has created to show her company’s profits.

A B C D E F G
1 DIY Inc.
2
3 2012 2013 2014 2015 2016
4
5 1st quarter $135,000 $146,000 $158,000 $162,000 $154,000
6 2nd quarter $142,000 $149,000 $161,000 $167,000 $157,000
7 3rd quarter $138,000 $150,000 $159,000 $163,000 $151,000
8 4th quarter $129,000 $141,000 $146,000 $148,000 $147,000
9
10 Total profits $544,000 $586,000 $624,000 $640,000 $609,000
11

Describe, giving reasons, the most appropriate type of graph or chart for displaying:

(i) the company’s profits, throughout 2016 showing comparisons of each quarter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(ii) the company’s profits, showing the trend for all four quarters in each year from 2012 to 2016.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/13/M/J/17


15

BLANK PAGE

© UCLES 2017 9626/13/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/13/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 4 9 7 6 8 3 9 6 8 *

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NH) 143196
© UCLES 2017 [Turn over
2

1 A bank has strategies in place to safeguard its information technology (IT) services. You have
been asked to check and update the strategies that are designed to try and prevent IT disasters
from happening, the strategy for disaster recovery management and the strict password policy.

(a) Describe how you would use risk analysis to check the strategy for disaster recovery
management.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The bank’s strict password policy has rejected these two passwords:

abc
1234AAA

Explain why they have been rejected.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]
© UCLES 2017 9626/31/M/J/17
3

(c) Explain the precautions that you would take to try and prevent a disaster happening to the
data used by the IT services.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/31/M/J/17 [Turn over


4

2 Project management software is used to create an overview of the tasks or activities required in a
project.

One type is desktop-based project management software.

Describe other types of project management software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/31/M/J/17


5

3 Frank is a web designer who writes his own code and uses JavaScript on his webpages. He
wants to print his name on every page. He creates two versions of the code to run his JavaScript
on the webpage. These versions are represented here:

Version 1:

<script language="JavaScript">
document.write ("<p>My name is <b>Frank </b> </p>");
</script>

Version 2:

<script language="JavaScript" src="FranksJavaScriptcode.js">


</script>

where the instructions for writing Frank’s name are in the file called “FranksJavaScriptcode.js”

Explain why Frank prefers to use Version 2 of the code.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/31/M/J/17 [Turn over


6

4 A wide area network uses a number of different protocols.

(a) Describe each of the following wide area network (WAN) protocols.

(i) HDLC:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Frame relay:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) An updated version of a free operating system has to be downloaded quickly. The operating
system is contained in a very large file. There is a choice of using ‘BitTorrent’ or file transfer
protocol (FTP) for the download.

Explain, with reasons, which method of download would be preferable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/31/M/J/17


7

(c) Describe how a network router provides connectivity between a home network and the
internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/31/M/J/17 [Turn over


8

5 Discuss the benefits and drawbacks to small businesses of storing their data in the ‘cloud’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/31/M/J/17


9

6 A new operating system for tablet computers has been developed and is now ready for testing to
begin.

Analyse the difference between white box testing and black box testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/31/M/J/17 [Turn over


10

7 Evaluate the use of 3D printing for manufacturing goods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/31/M/J/17


11

8 You have been asked to use data mining to analyse economic trends for a business.

Describe the tasks involved in data mining that you would have to carry out to produce an overview
of an economic trend.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/31/M/J/17 [Turn over


12

9 Dylan works for a graphics design company producing images in GIF, JPEG and PNG file formats.
He has been asked to produce some high-quality still images for use in advertising on the World
Wide Web. He has to choose one of the file formats to store the images.

Choose the most appropriate file format by comparing the features of the three different formats.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/31/M/J/17


13

10 A large, profitable manufacturing company wishes to replace its current computer system with a
new one. The company employs a large workforce in many different departments. The time to
be taken for the implementation is not important but the new system must work as efficiently as
possible.

The company has chosen the most appropriate method of implementation to suit its circumstances.

Identify the chosen method and explain, with reasons, why the company has chosen this compared
to other methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/31/M/J/17 [Turn over


14

11 A large company employs a small team of workers to design a new, complex product. They
all work on the same site and need to discuss possible designs and costings and to exchange
documentation on a weekly basis. Network connections are intermittent.

The company could use video-conferencing or face-to-face meetings for the workers’ discussions.

Identify, giving reasons, the more appropriate method.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/31/M/J/17


15

BLANK PAGE

© UCLES 2017 9626/31/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/31/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 6 3 4 4 5 2 8 7 1 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (NH/FC) 134398/2
© UCLES 2017 [Turn over
2

1 Information Technology enables new methods of working.

(a) Define each of the following:

(i) Video-conferencing:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Teleworking:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) Describe the drawbacks to employers of teleworking.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 9626/32/M/J/17


3

2 Companies must protect the data that is used and stored on their networks.

(a) Evaluate the use of a firewall in protecting the data on a company network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2017 9626/32/M/J/17 [Turn over


4

(b) Describe how a proxy server can help to protect a company network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/32/M/J/17


5

3 A report about the computer system of a company is to be written. The activities to be carried out
so that the report can be presented by the due dates are shown below:

Number of days
Activity allocated to
activity
Evaluation of initial report 6
Initial research of the system 2
Interviewing users of the system 2
Writing the final report 4
Writing the initial report 3

Using the table below, create a Gantt chart to show a possible schedule of activities.

Clearly indicate which tasks are carried out in parallel and which tasks are carried out sequentially.

Initial report due

Final report due

Week beginning Week beginning Week beginning


4 September 2017 11 September 2017 18 September 2017

Activity
M T W T F M T W T F M T W T F

[8]

© UCLES 2017 9626/32/M/J/17 [Turn over


6

4 RockIT Limo Hire is a taxi company that has an online booking system. Customers can book a
journey using a smartphone. When the company receives a booking request from a customer, it
collects the following data:

• customer name and mobile telephone number


• how many passengers
• address from which journey will start
• address of destination
• date and time of journey.

RockIT Limo Hire’s computer system checks its booking diary to see if the booking can be
accepted.

If the booking can be accepted:

• the customer is informed by text (SMS) that the booking is confirmed


• the booking is added to the electronic diary.

If the booking cannot be accepted:

• the customer is sent a text (SMS) to state that the booking is refused
• the customer details are deleted from the system.

© UCLES 2017 9626/32/M/J/17


7

In the box below, draw a Level 1 data flow diagram (DFD) to represent the RockIT Limo Hire
booking system.

[8]

© UCLES 2017 9626/32/M/J/17 [Turn over


8

5 An examination board uses mail merge to create letters to send to candidates by email.

The letter template showing the places to insert the candidate details is illustrated below:

Full name and address to go in this


area.

Cambridge Assessment
Cambridge International Examinations
1 Hills Road
Cambridge
United Kingdom

Dear Title and Family name


We wish to inform you that this examination paper must be taken in June.

Yours sincerely,

Director

Cambridge International Examinations

Part of the data source of candidates is shown here:

Family First Title Address Address City ZIP/Postal Country Email address
name name line 1 line 2 code

Smith Harold Mr 5 Duck Cherry Cambridge CB1 2FX UK harold@smith.co.uk


Lane Hinton

Bandhari Chandrak Mr Tilak Lucknow 226004 India chan@bandhari.in


Nagar
Rd

Zhang Jiao Ms Xinbei Miyun Beijing 101500 China jiao@zhang.cn


Rd

Johns Helen Mrs PO Box Palmerston Palmerston 4412 New Helen23@johns.nz


234 Nth Central Nth Zealand

© UCLES 2017 9626/32/M/J/17


9

(a) Explain how you would use the data given in the table to create the template shown.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Explain how you would produce the letters to all the candidates apart from those in New
Zealand.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 9626/32/M/J/17 [Turn over


10

6 Quick Response (QR) codes are used in marketing to convey information to users.

(a) Describe how a QR code stores information.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe the benefits to advertisers of using QR codes on their products.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2017 9626/32/M/J/17


11

(c) Describe how a QR code may put the user at risk from malicious code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/32/M/J/17 [Turn over


12

7 Animators create effects by ‘morphing’ images from one into another. An example of one image
being morphed into another is shown in Fig. 1.

Original image Transition image Final image

Fig. 1

Explain how a smooth transition between these images is created by ‘morphing’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/32/M/J/17


13

8 A software company produces games for use on smartphones. It uses the Rapid Application
Development method to develop the games.

Discuss the advantages and disadvantages of the Rapid Application Development method.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/M/J/17 [Turn over


14

9 JavaScript is a programming language used in webpages.

Fig. 2 shows a table created with JavaScript in a webpage.

1 2 3 4 5 6 7 8 9 10
2 4 6 8 10 12 14 16 18 20
3 6 9 12 15 18 21 24 27 30
4 8 12 16 20 24 28 32 36 40
5 10 15 20 25 30 35 40 45 50
6 12 18 24 30 36 42 48 54 60
7 14 21 28 35 42 49 56 63 70
8 16 24 32 40 48 56 64 72 80
9 18 27 36 45 54 63 72 81 90
10 20 30 40 50 60 70 80 90 100

Fig. 2

The code that created the table is shown below:

<html>
<body>
<script language="javascript">
var tableout;
tableout = "<table border='1' width='300' cellspacing='0'
cellpadding='3'>"
for (b = 1; b <= 10; b++) {
tableout = tableout + "<tr>";
for (g = 1; g <= 10; g++) {
tableout = tableout + "<td>" + b * g + "</td>";
}
tableout = tableout + "</tr>";
}
tableout = tableout + "</table>";
document.write (tableout);
</script>
</body>
</html>

© UCLES 2017 9626/32/M/J/17


15

Explain how the loops in the code create the table.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/M/J/17 [Turn over


16

10 A country is considering launching a satellite to enhance its internet connectivity.

Evaluate the use of satellites for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/M/J/17


17

11 A college department has a free Massive Open Online Course (MOOC) with access for its students
via the World Wide Web.

Describe the benefits of a MOOC.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/32/M/J/17


18

BLANK PAGE

© UCLES 2017 9626/32/M/J/17


19

BLANK PAGE

© UCLES 2017 9626/32/M/J/17


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/32/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 8 4 3 2 1 6 7 6 6 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NH) 134399/3
© UCLES 2017 [Turn over
2

1 A bank has strategies in place to safeguard its information technology (IT) services. You have
been asked to check and update the strategies that are designed to try and prevent IT disasters
from happening, the strategy for disaster recovery management and the strict password policy.

(a) Describe how you would use risk analysis to check the strategy for disaster recovery
management.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) The bank’s strict password policy has rejected these two passwords:

abc
1234AAA

Explain why they have been rejected.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]
© UCLES 2017 9626/33/M/J/17
3

(c) Explain the precautions that you would take to try and prevent a disaster happening to the
data used by the IT services.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/33/M/J/17 [Turn over


4

2 Project management software is used to create an overview of the tasks or activities required in a
project.

One type is desktop-based project management software.

Describe other types of project management software.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/33/M/J/17


5

3 Frank is a web designer who writes his own code and uses JavaScript on his webpages. He
wants to print his name on every page. He creates two versions of the code to run his JavaScript
on the webpage. These versions are represented here:

Version 1:

<script language="JavaScript">
document.write ("<p>My name is <b>Frank </b> </p>");
</script>

Version 2:

<script language="JavaScript" src="FranksJavaScriptcode.js">


</script>

where the instructions for writing Frank’s name are in the file called “FranksJavaScriptcode.js”

Explain why Frank prefers to use Version 2 of the code.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/33/M/J/17 [Turn over


6

4 A wide area network uses a number of different protocols.

(a) Describe each of the following wide area network (WAN) protocols.

(i) HDLC:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Frame relay:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[2]

(b) An updated version of a free operating system has to be downloaded quickly. The operating
system is contained in a very large file. There is a choice of using ‘BitTorrent’ or file transfer
protocol (FTP) for the download.

Explain, with reasons, which method of download would be preferable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/33/M/J/17


7

(c) Describe how a network router provides connectivity between a home network and the
internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/33/M/J/17 [Turn over


8

5 Discuss the benefits and drawbacks to small businesses of storing their data in the ‘cloud’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/33/M/J/17


9

6 A new operating system for tablet computers has been developed and is now ready for testing to
begin.

Analyse the difference between white box testing and black box testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/33/M/J/17 [Turn over


10

7 Evaluate the use of 3D printing for manufacturing goods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/33/M/J/17


11

8 You have been asked to use data mining to analyse economic trends for a business.

Describe the tasks involved in data mining that you would have to carry out to produce an overview
of an economic trend.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/33/M/J/17 [Turn over


12

9 Dylan works for a graphics design company producing images in GIF, JPEG and PNG file formats.
He has been asked to produce some high-quality still images for use in advertising on the World
Wide Web. He has to choose one of the file formats to store the images.

Choose the most appropriate file format by comparing the features of the three different formats.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/33/M/J/17


13

10 A large, profitable manufacturing company wishes to replace its current computer system with a
new one. The company employs a large workforce in many different departments. The time to
be taken for the implementation is not important but the new system must work as efficiently as
possible.

The company has chosen the most appropriate method of implementation to suit its circumstances.

Identify the chosen method and explain, with reasons, why the company has chosen this compared
to other methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/33/M/J/17 [Turn over


14

11 A large company employs a small team of workers to design a new, complex product. They
all work on the same site and need to discuss possible designs and costings and to exchange
documentation on a weekly basis. Network connections are intermittent.

The company could use video-conferencing or face-to-face meetings for the workers’ discussions.

Identify, giving reasons, the more appropriate method.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/33/M/J/17


15

BLANK PAGE

© UCLES 2017 9626/33/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/33/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 6 9 7 9 0 1 9 7 4 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (ST/SW) 142860
© UCLES 2017 [Turn over
2

1 Tick the four most accurate statements regarding LANs and WANs.

A WAN is a Wireless Area Network.

A LAN is a Live Area Network.

A LAN covers a smaller geographical area than a WAN.

A WAN has a higher data transfer rate than a LAN.

Unlike a LAN, the signal does not deteriorate in a WAN.

A LAN does not need a router to connect computers together.

A WAN experiences more data transmission errors than a LAN.

A WAN has a lower bandwidth than a LAN.

The internet is an example of a LAN.

A WAN is more secure than a LAN.


[4]

2 Tick the four statements which are true about the use of expert systems.

A knowledge base is a key component of an expert system.


Experts do not need to make a judgement; they just accept the results of the
expert system.
The user interface is used for both input and output.

The rules base can contain IF… THEN statements.

The inference engine searches the user interface to find possible solutions.

An expert system is often used in car driving simulators.

An expert system is not as accurate as a single expert would be.

A knowledge engineer is employed to create an expert system.

An expert system never needs updating.

Expert systems always come up with exact solutions.


[4]

© UCLES 2017 9626/11/M/J/17


3

3 A newspaper story is regarded as static data.

Using another appropriate example, describe what is meant by static data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

4 Ashraf has used a word processor to type up an essay for his history assignment. He wishes to
make sure that there are no errors in the text he has written.

Describe how he could proofread his essay.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/11/M/J/17 [Turn over


4

5 A school secretary has just been given some student data to enter into a school’s database of
student records.
These include student numbers and dates of birth such as:

13542767 14/07/2000
11987643 13/10/2001

In order to ensure accuracy of the input, the data will be validated.


Possible validation checks which could be used are range checks, check digits and format checks.

Analyse the effectiveness of these checks in validating this data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/11/M/J/17


5

6 High-level languages can be translated using a compiler or an interpreter.

(a) Describe the features of a compiler.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Describe the features of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/11/M/J/17 [Turn over


6

7 A school has a computerised weather station which monitors a number of atmospheric conditions
or variables.

Describe how data is collected, processed and displayed using such a system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/11/M/J/17


7

8 Li is very concerned that one day he could be a victim of a scam to take money from his bank
account. He is particularly worried about smishing and pharming.

Describe what is meant by

(a) smishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) pharming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/11/M/J/17 [Turn over


8

9 A recent BBC news bulletin claimed:

The digital divide, like many other economic or social problems, is a global issue.

Explain what is meant by the digital divide.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/11/M/J/17


9

10 Here is a table of data about individuals and their families which is being converted into a database.

Family_name First_name C D E F

Gustoffsson Gunnar 18/05/1957 M Divorced 2

Sandhu Jasvinder 09/08/1988 F Single 0

Otieno Peter 27/12/2001 M Single 0

Qabbani Nizar 01/01/1990 M Married 3

Wanjeku Jane 22/05/1994 F Married 4

Garcia Francesca 12/11/1986 F Married 5

Potter James 17/10/1992 M Married 0

Suggest suitable field names for C, D, E and F. For each field, state an appropriate data type
and give a reason for your choice. For each field, state, with a reason, the number of bytes the
database would need to allocate for the data to be stored.

(i) C ..................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

(ii) D .................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

(iii) E ................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2017 9626/11/M/J/17 [Turn over


10

(iv) F .................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2017 9626/11/M/J/17


11

11 Rajvinder and his team of car designers are producing designs for a new model. Their office is on
the other side of town from the company’s head office. Every month, Rajvinder and the designers
report to the company directors by means of a web conference.

Describe how Rajvinder would set up this web conference, assuming that he is using a third party
to supply the service and that he has checked that all the hardware and software is working.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/11/M/J/17 [Turn over


12

12 Dudley Nuclear Fuels (DNF) creates and operates nuclear reactors. They often create models of
reactors before building them in real life.

Discuss the benefits and drawbacks to DNF of using models.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/11/M/J/17


13

13

Above is a pie chart showing the proportion of students following different courses at a school. In
its present form it is not providing any information.

Describe, using examples related to this scenario, how you would improve this chart so that it did
provide information which could be used by the head teacher of the school.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/11/M/J/17 [Turn over


14

14 Imran has developed a simple library database system which contains information about the
books. Each record contains the following data:
Book title, author, ISBN, borrowed (Y/N), date borrowed, borrower number.

Design an appropriate online data entry form for one book, clearly indicating the amount of space
required for each field. Your design must represent a computer screen and, where appropriate,
allow the user to enter data by clicking the mouse rather than entering text.

[8]

© UCLES 2017 9626/11/M/J/17


15

15 Frida has been given the task of creating a database to store all her company’s customer records
and sales records. She is going to produce a relational database.
The customer records will have the fields Customer_id, Name, Contact_phone and
Card_number.
The sales records will have the fields Invoice_number, Item_number, Item_description,
Item_cost and Customer_ref.

(a) Complete the diagram below to show how the tables will be combined.

[4]

(b) Describe how you would create the relational database in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/11/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/11/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 2 3 4 2 0 8 0 6 7 4 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (LK/SW) 133328/2
© UCLES 2017 [Turn over
2

1 Tick the four most accurate statements regarding LANs and WANs.

A WAN is a Wireless Area Network.

A LAN is a Live Area Network.

A LAN covers a smaller geographical area than a WAN.

A WAN has a higher data transfer rate than a LAN.

Unlike a LAN, the signal does not deteriorate in a WAN.

A LAN does not need a router to connect computers together.

A WAN experiences more data transmission errors than a LAN.

A WAN has a lower bandwidth than a LAN.

The internet is an example of a LAN.

A WAN is more secure than a LAN.


[4]

2 Tick the four statements which are true about the use of expert systems.

A knowledge base is a key component of an expert system.


Experts do not need to make a judgement; they just accept the results of the
expert system.
The user interface is used for both input and output.

The rules base can contain IF… THEN statements.

The inference engine searches the user interface to find possible solutions.

An expert system is often used in car driving simulators.

An expert system is not as accurate as a single expert would be.

A knowledge engineer is employed to create an expert system.

An expert system never needs updating.

Expert systems always come up with exact solutions.


[4]

© UCLES 2017 9626/12/M/J/17


3

3 A newspaper story is regarded as static data.

Using another appropriate example, describe what is meant by static data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

4 Ashraf has used a word processor to type up an essay for his history assignment. He wishes to
make sure that there are no errors in the text he has written.

Describe how he could proofread his essay.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/12/M/J/17 [Turn over


4

5 A school secretary has just been given some student data to enter into a school’s database of
student records.
These include student numbers and dates of birth such as:

13542767 14/07/2000
11987643 13/10/2001

In order to ensure accuracy of the input, the data will be validated.


Possible validation checks which could be used are range checks, check digits and format checks.

Analyse the effectiveness of these checks in validating this data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/12/M/J/17


5

6 High-level languages can be translated using a compiler or an interpreter.

(a) Describe the features of a compiler.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Describe the features of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/12/M/J/17 [Turn over


6

7 A school has a computerised weather station which monitors a number of atmospheric conditions
or variables.

Describe how data is collected, processed and displayed using such a system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/12/M/J/17


7

8 Li is very concerned that one day he could be a victim of a scam to take money from his bank
account. He is particularly worried about smishing and pharming.

Describe what is meant by

(a) smishing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) pharming.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2017 9626/12/M/J/17 [Turn over


8

9 A recent BBC news bulletin claimed:

The digital divide, like many other economic or social problems, is a global issue.

Explain what is meant by the digital divide.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/12/M/J/17


9

10 Here is a table of data about individuals and their families which is being converted into a database.

Family_name First_name C D E F

Gustoffsson Gunnar 18/05/1957 M Divorced 2

Sandhu Jasvinder 09/08/1988 F Single 0

Otieno Peter 27/12/2001 M Single 0

Qabbani Nizar 01/01/1990 M Married 3

Wanjeku Jane 22/05/1994 F Married 4

Garcia Francesca 12/11/1986 F Married 5

Potter James 17/10/1992 M Married 0

Suggest suitable field names for C, D, E and F. For each field, state an appropriate data type
and give a reason for your choice. For each field, state, with a reason, the number of bytes the
database would need to allocate for the data to be stored.

(i) C ..................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

(ii) D .................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

(iii) E ................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2017 9626/12/M/J/17 [Turn over


10

(iv) F .................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[2]

© UCLES 2017 9626/12/M/J/17


11

11 Rajvinder and his team of car designers are producing designs for a new model. Their office is on
the other side of town from the company’s head office. Every month, Rajvinder and the designers
report to the company directors by means of a web conference.

Describe how Rajvinder would set up this web conference, assuming that he is using a third party
to supply the service and that he has checked that all the hardware and software is working.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2017 9626/12/M/J/17 [Turn over


12

12 Dudley Nuclear Fuels (DNF) creates and operates nuclear reactors. They often create models of
reactors before building them in real life.

Discuss the benefits and drawbacks to DNF of using models.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/12/M/J/17


13

13

Above is a pie chart showing the proportion of students following different courses at a school. In
its present form it is not providing any information.

Describe, using examples related to this scenario, how you would improve this chart so that it did
provide information which could be used by the head teacher of the school.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2017 9626/12/M/J/17 [Turn over


14

14 Imran has developed a simple library database system which contains information about the
books. Each record contains the following data:
Book title, author, ISBN, borrowed (Y/N), date borrowed, borrower number.

Design an appropriate online data entry form for one book, clearly indicating the amount of space
required for each field. Your design must represent a computer screen and, where appropriate,
allow the user to enter data by clicking the mouse rather than entering text.

[8]

© UCLES 2017 9626/12/M/J/17


15

15 Frida has been given the task of creating a database to store all her company’s customer records
and sales records. She is going to produce a relational database.
The customer records will have the fields Customer_id, Name, Contact_phone and
Card_number.
The sales records will have the fields Invoice_number, Item_number, Item_description,
Item_cost and Customer_ref.

(a) Complete the diagram below to show how the tables will be combined.

[4]

(b) Describe how you would create the relational database in part (a).

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/12/M/J/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/12/M/J/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1 4
Boolean is a data type representing one of two states. 3
Text fields cannot contain numbers.
Numeric fields cannot contain text. 3
Integer is a numeric data type used for storing decimal numbers.
Date is a data type which can be used for storing images.
The real number data type is used for fields containing whole
numbers only.
The numeric data type can be sub divided into different types of
3
number.
The alphanumeric data type can contain punctuation marks. 3
The text data type is the easiest type of data to validate.
Currency must be stored as text.

Question Answer Marks

2 4
A table that has not got a unique key can still be in first normal
form.
Normalisation does not attempt to eliminate storing the same data
in more than one table.
Normalisation involves breaking down a table into less redundant,
3
smaller tables.
There are no duplicate records in first normal form. 3
A table is in second normal form if it is in first normal form and,
3
additionally, does not have a composite primary key.
A table in first normal form must use all the relationships, one to
one, one to many and many to one.
A database is in third normal form if it is in second normal form
and each table has no non-key attributes that depend upon other 3
non-key attributes.
Third Normal Form tables can still have non-key attributes
depending on other non-key attributes.
Third Normal Form tables can still have fields that do not depend
on the primary key.
Every table in a relational database must have a foreign key.

© UCLES 2017 Page 2 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3 Six from: 6

Static information sources are carefully checked for accuracy«


«as once the data are used it is difficult to change
There is a limited amount of information in a static information source«
«as soon as it is created it is difficult to have information added to it
A dynamic data source can have information updated quite quickly
The data in a dynamic data source is usually up to date/static data tends to
go out of date quickly
There can be many contributors to a dynamic data source such as a web
site«
«so the information can be inaccurate.

© UCLES 2017 Page 3 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(a) This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will explain both the advantages and disadvantages of different
input devices using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will explain the advantages and disadvantages of input devices
although development of some of the points will be limited to advantages or
disadvantages, examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will only give advantages/disadvantages of input devices,
examples, if used, may lack relevance.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may include:

The use of a keyboard to type in the amounts of money to be paid and


recording details of the customers
The advantage of keyboards is that experienced users can enter details
more quickly than other methods
Difficulty of entering amounts other than selecting numbers using a mouse
Disadvantage is that data is slow to enter compared with DDE

Touch screen could be used to enter amounts or customer details


Quicker to enter data than using a mouse
May cause screen to be stained and make viewing difficult

RFID reader can be used to enter details from passport


Quicker than manually entering data
Readers are expensive to buy initially

Uses chip reader to read credit/debit cards


More reliable than reading magnetic stripe
Quicker than typing in details from the card
Contactless card readers speed up transactions as no PIN is required.

© UCLES 2017 Page 4 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(b) Evaluation based on: 8

Advantages
Hard disks tend to have higher storage capacities than SSDs
Hard disk drives still cost less per gigabyte than SSDs
HDDs last longer than SSDs «
«the NAND flash used in SSDs can only be used for a finite number of
writes
The choice and availability of SSDs is still limited

Disadvantages
Hard Disk Drives are more susceptible to shock and damage«
« as they consist of various moving parts
SSDs have faster data transfer rate
SSDs have quicker boot ups«
«can have almost instantaneous data access«
«HDDs data access speed is dependent on how close the data is to the
read/write heads«
«while all parts of the SSD can be accessed at once
SSDs use significantly less power at peak load than hard drives«
«SSD's energy efficiency can deliver longer battery life in laptops
With no moving parts SSDs run at near silent operation«
«unlike whirring hard disk drives.

Question Answer Marks

5(a) 4
COUNTIF(C4:C14,">40")

COUNTIF() 1 mark
C4:C14, 1 mark
>40 1 mark
,“” 1 mark

5(b) 5
=IF(C4>40,C4-40,"")

=IF() 1 mark
C4 1 mark
>40 1 mark
,C4-40 1 mark
,“” 1 mark

5(c) 5
=IF(C4>40,D4*E4*1.5,"")

=IF() 1 mark
C4>40 1 mark
,D4*E4 1 mark
*1.5 1 mark
,”” 1 mark

© UCLES 2017 Page 5 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(i) Phishing 3
Three from:

Involves using email to persuade people to divulge their personal


information
The email may include a website URL, inviting the receiver to go to the
site«
«looks just like the actual bank’s website but is a fake website
The email may ask customer to reply with their bank details
The email usually contains something that demands the target's immediate
attention
Examples include "We confirm that you have signed up to our service. You
will be charged $2 a day unless you cancel your order on this URL: «”
The website then asks them to enter their personal/financial information.

6(ii) Vishing 3
Three from:

Victim receives a phone call to persuade him to divulge his personal


information
Claims to be a representative of the bank and says«
«that there has been some fraudulent activity on the customer’s account
Often involves having the customer phone the bank
Fraudster’s computer redirects phone call to own phone
Gives customer their bank details to get their confidence
Gets customer to log on to bank’s site and enter their details to transfer
money to their new account which has been set up
This account is actually the fraudster’s own bank account.

© UCLES 2017 Page 6 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7(a) Two from: 2

It is the global system of interconnected computer networks


It uses the Internet protocol suite (TCP/IP) to link devices
It is a network of networks linked by an array of electronic, wireless, and
optical networking technologies.

7(b) Six from: 6

Electronic Mail – email is a message that may contain text, files, images, or
other attachments sent through a network to a specified individual or group
of individuals

World Wide Web – The World Wide Web is a system of Internet servers that
support specially formatted HTML documents

Video Conferencing Services – to conduct a conference between two or


more participants at different sites by using computer networks to transmit
audio and video data

VoIP- Voice over Internet Protocol – the delivery of voice communications


and multimedia sessions over Internet Protocol (IP) networks

Instant messaging – to communicate via messages in real time over the


internet

Video streaming – video is sent to the viewer in real time

File transfer – transmitting files over a computer network like the internet.

© UCLES 2017 Page 7 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

8 Two marks each from: 6

Trimming –
On the Timeline he would position the cursor over the in/start or out/end
point
When the trim handles appear drag the handle to trim the clip«
«action the trim

Adding sound –
In the software he would open the video and audio files that he wants to
merge
Then drag the added files to the corresponding tracks on the timeline board
The video file would be placed on the video track and the audio file on the
audio track

Adding captions –
Once he has chosen the style he wants, right-click it and select where he
wants to place it
He would select start of the video track/add to the end of the video track/add
to the title track
Then double-click the title frame in the preview window and type or paste
the text.

Question Answer Marks

9 Six from: 6

Benefits
Offer a much higher level of secure communication when compared to other
remote methods of communication
Every file coming into a computer or going out from a computer is
encrypted«
« meaning no unwanted user will be able to open the files
Can be used to work automatically as part of logging on

Drawbacks
The company may not permit him to use other third party software on his
computer in order to safeguard the integrity of their VPN connection
The use of mobile devices to initiate access to the virtual private network
can cause security issues«
«if Bruce’s local wireless network is not secure
Packet loss will be higher with the VPN and cause data to be lost and need
to be retransmitted«
«increasing the time taken to receive documents
The connection depends on the ISP and so performance can be variable
Will need to install extra anti- malware tools to ensure his PC is clean in
order to comply with VPN suppliers’ requirements.

Must have at least two of each to gain full marks.

© UCLES 2017 Page 8 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

10 Four matched pairs from: 8

Range check for the exam mark


No mark should be less than 10 or greater than 100

Lookup check for year


Years should match 12 or 13

Format check for date of birth


All dates of birth must be two digits followed by a slash followed by two
digits followed by a slash followed by four digits

Consistency check on year with date of birth


The date of birth can be checked to see that the year the student is in
corresponds to that.

Question Answer Marks

11(a) Three from: 3

Software that is specially developed for a specific company/business


It is made to accommodate that customer's particular preferences and
needs
Written by programmers to solve specific problems
Owned by the business that commissions it.

11(b) Three from: 3

Software that is ready-made and already exists


It is available to all businesses and companies
It is owned by the company that created it
Has to be adapted to fit the business that has purchased it.

Question Answer Marks

12(i) Bar/column chart 1 mark 3

The height of the bars represent the monetary value and the x axis is the
category axis (the quarters) 1 mark

Viewers can see comparisons by distinguishing the relative heights/lengths


of the bars 1 mark

12(ii) Line chart 1 mark 3

Points are plotted, monetary value against year and these are joined
together by straight lines 1 mark

Useful for emphasising the trend over time since they allow a viewer to trace
it by working backwards or interpolating 1 mark

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 7 printed pages.

© UCLES 2017 [Turn over


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Four from: 4

Qualitative risk analysis to prioritise risks for analysis


Quantitative risk analysis
...of likelihood of occurrence/probabilities
...of consequences of occurrence
To identify effect/cost of risks caused by e.g.
...loss of access to premises
...loss of data
...loss of it function
...loss of skills
Produce a computer simulation of the disaster
Produce a report of the risks.

1(b) Six from: 6

The abc password is too short and does not meet minimum length
requirements/number of character requirements
Does not meet requirement for different types of characters
Passwords must not be easily guessed and this is a simple pattern
1234AAA password has a sequence of characters/numbers
...has repeating characters
Neither have a combination of upper/lower case/number/special characters.

1(c) Six from: 6

Backups made and sent off-site at regular intervals


Backups made on-site and automatically copied to off-site disk
Backups made directly to off-site/remote/’cloud’ servers
Local mirrors of systems and/or data and use of disk protection technology
such as RAID
Surge protectors to minimize the effect of power surges on computer
systems
Using uninterruptible power supply (UPS) and/or backup generator to protect
against a power failure
Use of fire prevention/mitigation systems such as alarms and fire
extinguishers
Use of anti-virus software to protect data against corruption/loss/deletion
Use of firewalls to prevent unauthorised/control access
Use of physical security measures to control access by personnel
Important passwords/codes should be held by more than one person/in
secure conditions, but accessible in an emergency.

© UCLES 2017 Page 2 of 7


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2 Four from: 4

Desktop PMS set up as a program that runs on the desktop


...single user
Web-based accessed using a web browser
Use a smartphone or tablet to gain access to the PMS
Use a thin client via a web browser
Personal PMS one used at home
...manage lifestyle or home projects
Single user programmed so only one person will ever need to edit the project
plan at once
Collaborative system is programmed to support multiple users once
...web-based tools available.

3 Six from: 6

Can call the code several times/from different pages/re-use the code
No need of re-writing/having several copies/copies on each webpage
Code only has to be tested once/checked for errors once
File/JavaScript is cached by web browser
...reduces network access time/reduces cost of fetching data
JavaScript code embedded in webpages can slow loading times/reduce
browser performance
...webpage can slow/stop while browser executes code
Can separate code into different conceptual/functional areas
...provides modularity to code
...separate html and JavaScript code so easier to read/maintain.

4(a)(i) Two from: 2

(HDLC is):
High-Level Data Link Control
Layer 2 (data link) protocol
Connects point-to-point serial devices/leased lines
Uses error correction
Routers encapsulate HDLC before putting on LAN.

4(a)(ii) Two from: 2

(Frame relay is):


Layer 2 and 3/data link/network layer protocol
Puts data into variable-sized packets/frames
Does not include error-correction/error corrections is done by devices
...can be unreliable
Specifies physical and logical link layers
Used in packet switching
Used on integrated services digital network (ISDN)
Used in permanent virtual circuits (PVC)
Can provide QoS
...worth constant bitrate/emulation of circuit switching.

© UCLES 2017 Page 3 of 7


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(b) Four from: 4

If many people want the OS at once bit torrent is resistant to


flash-dot/crowds/website overload/dos/FTP is not resistant to
flash-dot/crowds/website overload/dos
Bit torrents can be paused/stopped and restarted/FTP cannot restart if
paused, so if interrupted the download has to be done again
Bit torrent makes many small data requests from different IP
connections/addresses/FTP is from one IP connection/address so is quicker
to download the large OS file
Bit torrent downloads file sections randomly/rarest first/ FTP is sequential
download of file sections
Bit torrent can be slow to get up to full speed/FTP achieves full speed as
soon as it starts download and can achieve very high download speeds.

4(c) Six from: 6

Has two or more connections to different networks


Router reads address information in the packet header
...to determine destination of packet
...has a routing table/policy
...contains data on all possible routes to groups of addresses
...priorities for connections for handling data packets
...routing tables are dynamic/can be updated
...directs packet to next router if destination address not known
...direct packets to address if destination is known
Router updates ‘hop’ count every time it forwards a packet
...when ‘hop’ count limit is reached packet is dropped/discarded
...usually a maximum of 16 hops
...or marked as undeliverable
...so packet does not live forever on network/internet.

5 Eight from e.g.: 8

Benefits:
Reduced IT support requirements/staff so reduced costs to company
Reduced requirements for storage devices reduces costs/maintenance costs
Backups are managed by ‘cloud’ company so reduced costs of media/staff to
carry out backups
Files can be accessed from anywhere with internet connection allowing
collaboration on documents/allows access to documents from home

Drawbacks:
Security issues are not under business control
‘Cloud’ service suppliers may go out of business so data is lost
Need for a reliable internet service to be able to access the data
Data may not be stored in same country as business so may be subject to
different laws/regulations.

Max 6 for all benefits or all drawbacks.


1 mark available for a reasoned conclusion.

© UCLES 2017 Page 4 of 7


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6 This question to be marked as a Level of Response. 8

Analyse requires that candidates explain the main points in detail, explaining
their effectiveness and characteristics.

Level 3 (7–8 marks)


Candidates will analyse in detail the differences between white box testing
and black box testing.
There will be a reasoned statement concerning the effectiveness of both
types of testing.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain the differences between white box testing and black
box testing.
There will be a reasoned statement concerning the effectiveness of one of
the types of testing.
For the most part, the information will be relevant and presented in a
structured and coherent format.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the differences between white box testing and black
box testing.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may make reference to e.g.:

White Box Testing is a testing method in which the internal structure/ design/
implementation is known to the tester.
Black Box Testing is a testing method in which the internal structure/ design/
implementation is NOT known to the tester.
In white box testing, programming knowledge is required; in black box
testing it is not.
In white box testing, programming knowledge is in-house; in black box
testing it is not.
White box testing needs access to a detailed design specification, black box
testing does not.
White box testing needs knowledge of the implementation, black box testing
does not.

© UCLES 2017 Page 5 of 7


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7 Eight from: 8

Advantages
Easier to customise products such as pills to users specific
requirements/genetic makeup
Printing can be done remotely so no need to transport the final product from
factory to destination
Prototypes can be produced more rapidly for testing so production is
speeded up
Manufacturing of product may be faster than traditional methods so product
is available sooner
Costs may be reduced due to reduction in tooling costs/ less need for
specialist machinery
No need to store excess inventory/reduced warehouse costs
Can produce items/spare parts in harsh environments where traditional
methods may not be feasible/possible

Disadvantages
Limited materials available for printing so product range is
restricted/materials may not be suitable for product’s eventual use
Copyright issues arise as easier for anyone to print the product
Dangerous items can be more easily created e.g. Knives/guns
Useless items produced and thrown away these have an environmental
impact
Limited size of products due to restrictions on size of printer
Printing can be quite slow compared to traditional manufacturing.

Max 6 for all advantages or all disadvantages.


1 mark available for a reasoned conclusion/opinion.

8 Six tasks from e.g.: 6

Identification of unusual data records/anomalies in economic data


Searching for relationships between variables/dependency detection in the
economic data
Clustering /discovering ‘similar’ groups and structures in the economic data
Classifying /generalizing known structures to apply to new economic data
Finding functions that model the economic data with the least error
Summarising the economic data
Producing reports on the economic data in a useful
format/charts/graphs/tables to show trends in the data.

© UCLES 2017 Page 6 of 7


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

9 Four from: 4

PNG images are lossless/do not lose data when edited so have higher
quality
JPEG (jpg) format is compressed with data being lost/data is lost during
editing but images are of lower quality/have artefacts compared to PNG
images
GIF only allows limited number of colours/256 colours so is not suitable for
high quality image publication
GIF allows several images in one file so animations are possible, but this is
not required.

10 Eight from: 8

Pilot running would not be appropriate as it not likely that each department
would need similar aspects of the system
Phased implementation would be possible because one department could
have their part system implemented...
...when working another part of system could be tried in another department
Parallel running would be possible as there are enough workers available to
use both systems at the same time
Parallel running would be possible as company can afford to employ two
sets of workers if more are needed
Parallel running is appropriate as the old system continues while problems
are fixed with the new system
Direct changeover would not be advisable as it may not work properly first
time
Direct changeover is a quick method but speed of changeover is not an
issue
Direct changeover is a cheaper method but the cost is not important to the
company.

11 Eight from: 8

Video-conferencing is not appropriate as network connectivity would lead to


break up of the conference
Video-conferencing is not appropriate as the workers are all on the same site
so expensive equipment does not need to be purchased
Large documents can be more easily shared and worked on
Meetings need to regularly held so video conference would need to be set
up often which would require technical expertise with recurring costs
Inconvenience for technical staff having to be available/on call for video
conference each week/regular basis
As they are on the same site, the company would not need to pay travel
expenses for face-to-face meetings so video-conferencing would not be an
advantage
As they are on the same site, there is no waste of time travelling to meetings
so video-conferencing would not be an advantage
The designs would be less likely to be hacked/stolen/copied.

Total: 90

© UCLES 2017 Page 7 of 7


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a)(i) Two from: 2

Simultaneous two-way video and audio communications


With two or more participants/locations
Using telecommunications networks
Via the internet.

1(a)(ii) Use of IT systems/telecommunication systems 2


To work remotely/from home/away from central office

1(b) Five from: 5

Increased costs of providing/maintaining computer equipment and


telecommunication links for the teleworkers
More difficult to manage the teleworkers so unable to e.g. Motivate/guide
them
More difficult to monitor the performance of the teleworkers so cannot check
on work rate/targets so easily
Cannot manage the times/hours of the working environment of teleworkers
so cannot tell when they are working
Cannot manage the health/safety aspects of the working environment of
teleworkers so may be liable for unknown risks
Increased security risk to the data/information that is used by/sent to/from
teleworkers so must set up secure links/encryption systems
Working in different time zones from company/other employees may cause
difficulties
Some types of work/tasks are unsuitable for teleworking.

© UCLES 2017 Page 2 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2(a) Eight from: 8

Advantages:
A firewall can provide protection to multiple networked computers
simultaneously
Firewalls can monitor traffic coming in and going out of a network«
«and produce log files for subsequent analysis
Firewalls can enforce password controls to enter/use the network to try to
prevent unauthorised users from gaining access
Firewalls can enforce access policies so that only authorised users can
access the network/parts of the network
Firewalls reduce the risk of key logging software sending details to third
parties by blocking the access out of the network

Disadvantages:
Firewalls are the central point of attack by hackers/potential intruders and
once breached there are no further defences
Firewalls can block legitimate process/applications so manual adjustment of
settings may be required
«can lead to allowing unwanted access by other processes if not
configured by experts
Firewalls are usually incapable of protecting against backdoor Trojans that
open ports to send data to third parties who can then access the system
Firewalls do not usually contain malware removal tools.

Max 6 for all advantages or all disadvantages.


1 mark is available for a reasoned conclusion/opinion.

2(b) Four from: 4

Acts as intermediary for client requests for services such as a web page/a
file
Provide content filtering to control the content that is accessed/enforce
acceptable use policies
Provide user authentication to control web access
Provide detailed logs of user web activity/flag up unacceptable use by
employees
Provide links to anti-malware applications to check incoming/outgoing data
Filtering based on URL lists
«DNS blacklists
«based on lists maintained by third party companies
Can provide NAT/anonymity of IP address.

© UCLES 2017 Page 3 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3 Eight from: 8

All 5 correct labels/abbreviations in activity column 1 mark


All 5 tasks in most appropriate order in chart 1 mark
All 5 correct lengths of activity 2 marks
4 correct lengths of activity 1 mark
less than 4 correct 0 marks

Initial research/interview users in parallel


and write initial report starts after initial research 1 mark

Sequential tasks shown 1 mark


(evaluation must start after write initial report)

Initial report end before/on due date/1st Friday 1 mark


Final report end on before/due date/2nd Thursday 1 mark

E.g.

© UCLES 2017 Page 4 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4 Eight from: e.g. 8

Customer with appropriate shape 1 mark


Diary store with appropriate shape 1 mark
Booking process with appropriate shape 1 mark

5 named arrows in correct direction 5 marks

© UCLES 2017 Page 5 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5(a) Five from: 5

Link the letter template to the data source


Check/preview to check formatting/layout/spelling
Insert merge field placeholders/codes for title, first name and family name
and address line 1, address line 2, city and Zip code, country details in
address space
«except email address
Insert merge field placeholders/codes for title and family name in area after
‘Dear’.

5(b) Two from: 2

Use filter/query on country field«


«Country NOT New Zealand
Select ‘finish’ merge to start the merge process to email
Use ‘skip if’ on country field = New Zealand.

6(a) Four from: 4

Information stored digitally as blocks of black/white squares


Small dots throughout code converted to binary numbers when scanned
«error correction algorithm used for validation
Variety of encoding methods available which can be mixed
Three larger squares store alignment data
Smaller squares store angle/size data
Scanned with narrow beam of light
«reflection from white areas read by light sensor/camera
May take up less space on packaging.

6(b) Two from: 2

Information is instantly available to consumers


Advertiser can decide the action the consumer takes when code is scanned
QR codes are a proven (ISO) standard to be accessible to all
Available information can be updated more easily
Use of QR codes is measureable so can be analysed
Reprinting of advertising material is reduced.

6(c) Four from: 4

Code may contain URL link


Web link followed
URL contains a Trojan that infects the device
Trojan is JavaScript
«which contacts servers that transmit malware to device
Use cross-site scripting vulnerability on a legitimate website to insert a
malicious QR code in place of code
«when a web browser opens the legitimate site, the QR code references
the hacker's site
Malicious QR codes can allow unauthorised people to control cell/mobile
phones to access messages/GPS/turn on the camera(s)/listen in on phone
conversations.

© UCLES 2017 Page 6 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7 Six from: 6

Warping/deforming these from the original images so final image has same
shape
«use of forward mapping
«each pixel in original image is mapped to an appropriate
«pixel in final image
«use of reverse mapping
«each pixel in the final image is sampled for an usable/ appropriate pixel in
the original
«all final image pixels are mapped to an original image pixel
Cross-dissolving the images
«a sequence of images shows a gradual fade from one to the other
«via a (series of) transition images
«original image is gradually distorted and faded out
«final image starts out totally warped to the first and is faded in.

8 Eight from: 8

Advantages:
Increased quality of product
«focusses on problems that are critical to end users
«rather than technical problems of interest to developers
More likely to complete project on time
More likely to complete within budget
«method focuses on incremental development so chances of failure are
reduced
More risk control
«the key risk factors show in the early part of the process
provides a flexible/adaptable process

Disadvantages:
Users are involved from the beginning and at all stages of the entire
project«
«takes more interaction throughout the entire life-cycle between users and
developers
«takes up the time of the experts
«costs are likely to be higher
RAD can be a new approach for some developers
«new tools/methods will be more likely to fail the first time as the team
learns the process
Less control over the process as it is adaptable
Poor design of prototypes
«developers constantly make minor changes to individual components
«ignore overall system architecture issues that produce a better overall
design
Not suitable for very large systems.

Max 6 for all advantages or all disadvantages.


1 mark is available for a reasoned conclusion/opinion.

© UCLES 2017 Page 7 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

9 Six from: 8

Code is embedded within the body HTML code


(global) variable (tableout) is declared/created/initialised
The HTML table values are placed within the variable
First/outer loop (on 4th line of JS code) executes 10 times«
«to create 10 rows using global variable and HTML <tr> code/to create
each row
Second/inner loop is executed each time outer loop executes
«to create 10 columns/cells
First time inner loop executes, the cell contains 1*1=1...
«second time inner loop executes, the cell contains 1*2=2
«third time inner loop executes, the cell contains 1*3=3
«up to cell that contains 1*10=10
When inner loop reaches 10, first row of cells is complete«
«next row is started with 2*1=2, 2*4 etc.
«up to 2*10=20
The process continues until outer loop reaches 10 and all 10 rows have
been created and filled.

10 This question to be marked as Level of Response. 8

Evaluation requires that advantages and disadvantages be discussed and


weighed up in importance.

Level 3 (7–8 marks)


Candidates will evaluate, in detail, by discussing the advantages and
disadvantages of the use of satellites for data communications.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be reasoned conclusions/opinions.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will evaluate by discussing the advantages and disadvantages
of the use of satellites for data communications.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be reasoned conclusions/opinions.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe by giving the advantage(s) and/or disadvantage(s)
the use of satellites for data communications.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Zero marks: Response with no valid content.

© UCLES 2017 Page 8 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

Answers may make reference to e.g.:

Advantages:
satellite communications:
• easier to setup of mobile communications
• are more economical than terrestrial communication over long
distances
• is most economical especially for low network traffic demands in remote
areas
• quality of transmitted signal is independent of distance
• quality of transmitted signal does not depend on location of sending and
receiving stations
• country/owner has control over their own network

Disadvantages:
• huge initial cost of manufacture/launch
• repair of satellite is almost impossible once it has been launched
• can be affected by severe weather conditions/very dark clouds
• can be affected by electromagnetic disturbances/events in space/sun
activity
• annoying time gap/delay between exchange of data reducing the
efficiency of satellite communications for data transmission.

11 Six from: 6

Can be organised anywhere/time as long as there is connectivity


Can use global resources
Can be any language to reflect first language of students
Can use any online tools that are available to students/known to
students/available in the region
Can use peer review/no exam pressures
Time zones and physical boundaries can be ignored
Can be organised quickly/as soon as you inform the students
Learning is/can be in informal surroundings so student more relaxed
Can reduce the costs to the college
There are no other students to distract the learner
Cross-discipline learning is easier/possible
Learning can continue beyond the formal time scale of the course
Encourages active learning beyond the course requirements
Reduces costs to colleges.

Total: 90

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 7 printed pages.

© UCLES 2017 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1(a) Four from: 4

Qualitative risk analysis to prioritise risks for analysis


Quantitative risk analysis
...of likelihood of occurrence/probabilities
...of consequences of occurrence
To identify effect/cost of risks caused by e.g.
...loss of access to premises
...loss of data
...loss of it function
...loss of skills
Produce a computer simulation of the disaster
Produce a report of the risks.

1(b) Six from: 6

The abc password is too short and does not meet minimum length
requirements/number of character requirements
Does not meet requirement for different types of characters
Passwords must not be easily guessed and this is a simple pattern
1234AAA password has a sequence of characters/numbers
...has repeating characters
Neither have a combination of upper/lower case/number/special characters.

1(c) Six from: 6

Backups made and sent off-site at regular intervals


Backups made on-site and automatically copied to off-site disk
Backups made directly to off-site/remote/’cloud’ servers
Local mirrors of systems and/or data and use of disk protection technology
such as RAID
Surge protectors to minimize the effect of power surges on computer
systems
Using uninterruptible power supply (UPS) and/or backup generator to protect
against a power failure
Use of fire prevention/mitigation systems such as alarms and fire
extinguishers
Use of anti-virus software to protect data against corruption/loss/deletion
Use of firewalls to prevent unauthorised/control access
Use of physical security measures to control access by personnel
Important passwords/codes should be held by more than one person/in
secure conditions, but accessible in an emergency.

© UCLES 2017 Page 2 of 7


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

2 Four from: 4

Desktop PMS set up as a program that runs on the desktop


...single user
Web-based accessed using a web browser
Use a smartphone or tablet to gain access to the PMS
Use a thin client via a web browser
Personal PMS one used at home
...manage lifestyle or home projects
Single user programmed so only one person will ever need to edit the project
plan at once
Collaborative system is programmed to support multiple users once
...web-based tools available.

3 Six from: 6

Can call the code several times/from different pages/re-use the code
No need of re-writing/having several copies/copies on each webpage
Code only has to be tested once/checked for errors once
File/JavaScript is cached by web browser
...reduces network access time/reduces cost of fetching data
JavaScript code embedded in webpages can slow loading times/reduce
browser performance
...webpage can slow/stop while browser executes code
Can separate code into different conceptual/functional areas
...provides modularity to code
...separate html and JavaScript code so easier to read/maintain.

4(a)(i) Two from: 2

(HDLC is):
High-Level Data Link Control
Layer 2 (data link) protocol
Connects point-to-point serial devices/leased lines
Uses error correction
Routers encapsulate HDLC before putting on LAN.

4(a)(ii) Two from: 2

(Frame relay is):


Layer 2 and 3/data link/network layer protocol
Puts data into variable-sized packets/frames
Does not include error-correction/error corrections is done by devices
...can be unreliable
Specifies physical and logical link layers
Used in packet switching
Used on integrated services digital network (ISDN)
Used in permanent virtual circuits (PVC)
Can provide QoS
...worth constant bitrate/emulation of circuit switching.

© UCLES 2017 Page 3 of 7


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

4(b) Four from: 4

If many people want the OS at once bit torrent is resistant to


flash-dot/crowds/website overload/dos/FTP is not resistant to
flash-dot/crowds/website overload/dos
Bit torrents can be paused/stopped and restarted/FTP cannot restart if
paused, so if interrupted the download has to be done again
Bit torrent makes many small data requests from different IP
connections/addresses/FTP is from one IP connection/address so is quicker
to download the large OS file
Bit torrent downloads file sections randomly/rarest first/ FTP is sequential
download of file sections
Bit torrent can be slow to get up to full speed/FTP achieves full speed as
soon as it starts download and can achieve very high download speeds.

4(c) Six from: 6

Has two or more connections to different networks


Router reads address information in the packet header
...to determine destination of packet
...has a routing table/policy
...contains data on all possible routes to groups of addresses
...priorities for connections for handling data packets
...routing tables are dynamic/can be updated
...directs packet to next router if destination address not known
...direct packets to address if destination is known
Router updates ‘hop’ count every time it forwards a packet
...when ‘hop’ count limit is reached packet is dropped/discarded
...usually a maximum of 16 hops
...or marked as undeliverable
...so packet does not live forever on network/internet.

5 Eight from e.g.: 8

Benefits:
Reduced IT support requirements/staff so reduced costs to company
Reduced requirements for storage devices reduces costs/maintenance costs
Backups are managed by ‘cloud’ company so reduced costs of media/staff to
carry out backups
Files can be accessed from anywhere with internet connection allowing
collaboration on documents/allows access to documents from home

Drawbacks:
Security issues are not under business control
‘Cloud’ service suppliers may go out of business so data is lost
Need for a reliable internet service to be able to access the data
Data may not be stored in same country as business so may be subject to
different laws/regulations.

Max 6 for all benefits or all drawbacks.


1 mark available for a reasoned conclusion.

© UCLES 2017 Page 4 of 7


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6 This question to be marked as a Level of Response. 8

Analyse requires that candidates explain the main points in detail, explaining
their effectiveness and characteristics.

Level 3 (7–8 marks)


Candidates will analyse in detail the differences between white box testing
and black box testing.
There will be a reasoned statement concerning the effectiveness of both
types of testing.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain the differences between white box testing and black
box testing.
There will be a reasoned statement concerning the effectiveness of one of
the types of testing.
For the most part, the information will be relevant and presented in a
structured and coherent format.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the differences between white box testing and black
box testing.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may make reference to e.g.:

White Box Testing is a testing method in which the internal structure/ design/
implementation is known to the tester.
Black Box Testing is a testing method in which the internal structure/ design/
implementation is NOT known to the tester.
In white box testing, programming knowledge is required; in black box
testing it is not.
In white box testing, programming knowledge is in-house; in black box
testing it is not.
White box testing needs access to a detailed design specification, black box
testing does not.
White box testing needs knowledge of the implementation, black box testing
does not.

© UCLES 2017 Page 5 of 7


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

7 Eight from: 8

Advantages
Easier to customise products such as pills to users specific
requirements/genetic makeup
Printing can be done remotely so no need to transport the final product from
factory to destination
Prototypes can be produced more rapidly for testing so production is
speeded up
Manufacturing of product may be faster than traditional methods so product
is available sooner
Costs may be reduced due to reduction in tooling costs/ less need for
specialist machinery
No need to store excess inventory/reduced warehouse costs
Can produce items/spare parts in harsh environments where traditional
methods may not be feasible/possible

Disadvantages
Limited materials available for printing so product range is
restricted/materials may not be suitable for product’s eventual use
Copyright issues arise as easier for anyone to print the product
Dangerous items can be more easily created e.g. Knives/guns
Useless items produced and thrown away these have an environmental
impact
Limited size of products due to restrictions on size of printer
Printing can be quite slow compared to traditional manufacturing.

Max 6 for all advantages or all disadvantages.


1 mark available for a reasoned conclusion/opinion.

8 Six tasks from e.g.: 6

Identification of unusual data records/anomalies in economic data


Searching for relationships between variables/dependency detection in the
economic data
Clustering /discovering ‘similar’ groups and structures in the economic data
Classifying /generalizing known structures to apply to new economic data
Finding functions that model the economic data with the least error
Summarising the economic data
Producing reports on the economic data in a useful
format/charts/graphs/tables to show trends in the data.

© UCLES 2017 Page 6 of 7


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

9 Four from: 4

PNG images are lossless/do not lose data when edited so have higher
quality
JPEG (jpg) format is compressed with data being lost/data is lost during
editing but images are of lower quality/have artefacts compared to PNG
images
GIF only allows limited number of colours/256 colours so is not suitable for
high quality image publication
GIF allows several images in one file so animations are possible, but this is
not required.

10 Eight from: 8

Pilot running would not be appropriate as it not likely that each department
would need similar aspects of the system
Phased implementation would be possible because one department could
have their part system implemented...
...when working another part of system could be tried in another department
Parallel running would be possible as there are enough workers available to
use both systems at the same time
Parallel running would be possible as company can afford to employ two
sets of workers if more are needed
Parallel running is appropriate as the old system continues while problems
are fixed with the new system
Direct changeover would not be advisable as it may not work properly first
time
Direct changeover is a quick method but speed of changeover is not an
issue
Direct changeover is a cheaper method but the cost is not important to the
company.

11 Eight from: 8

Video-conferencing is not appropriate as network connectivity would lead to


break up of the conference
Video-conferencing is not appropriate as the workers are all on the same site
so expensive equipment does not need to be purchased
Large documents can be more easily shared and worked on
Meetings need to regularly held so video conference would need to be set
up often which would require technical expertise with recurring costs
Inconvenience for technical staff having to be available/on call for video
conference each week/regular basis
As they are on the same site, the company would not need to pay travel
expenses for face-to-face meetings so video-conferencing would not be an
advantage
As they are on the same site, there is no waste of time travelling to meetings
so video-conferencing would not be an advantage
The designs would be less likely to be hacked/stolen/copied.

Total: 90

© UCLES 2017 Page 7 of 7


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1 4
A WAN is a Wireless Area Network.

A LAN is a Live Area Network.

A LAN covers a smaller geographical area than a WAN. 3

A WAN has a higher data transfer rate than a LAN.

Unlike a LAN, the signal does not deteriorate in a WAN.


A LAN does not need a router to connect computers
3
together.
A WAN experiences more data transmission errors than
3
a LAN.
A WAN has a lower bandwidth than a LAN. 3

The internet is an example of a LAN.

A WAN is more secure than a LAN.

Question Answer Marks

2 A knowledge base is a key component of an expert 4


3
system.
Experts do not need to make a judgement. They just
accept the results of the expert system.
The user interface is used for both input and output. 3

The rules base can contain IF THEN statements. 3


The inference engine searches the user interface to find
possible solutions.
An expert system is often used in car driving simulators.
An expert system is not as accurate as a single expert
would be.
A knowledge engineer is employed to create an expert
3
system.
An expert system never needs updating.

Expert systems always come up with exact solutions.

© UCLES 2017 Page 2 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3 Three from: 1 mark each 4

Data that does not change


It can be read without being written back to a file/not changed when
written back
Limited amount of information in a static information source
because as soon as it is created it is difficult to have information added
to it
Static data tends to go out of date quickly.

Appropriate example such as a CD ROM contains static data. 1 mark

Question Answer Marks

4 Four from: 4

Read the text carefully to find/correct typographical errors/mistakes in


grammar/style/spelling
Printing a copy is sometimes better than reading on screen
Read the essay out loud
he will hear other problems that he may not see when reading silently
He could use a blank sheet of paper to cover up the lines below the one
he is reading
which keeps him from skipping ahead of possible mistakes
Use the search function of the computer to find mistakes he is likely to
make
Search for "it," for instance, if he confuses "its" and "it's", "there" for
"their" or "they're"
Check separately for each kind of error he is likely to make, moving from
the most to the least important
Read through once backwards, sentence by sentence
Read through again forward to be sure subjects and verbs agree.

© UCLES 2017 Page 3 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will describe each check and give benefits and drawbacks of
each check/consider different reasons for using each check.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will describe each check and give benefits and drawbacks of
checks/consider different reasons for using each check although
development of some of the points will be limited to benefits or
drawbacks.
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only describe checks, and give basic reasons. Answers
may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may include:

A range check could only be carried out on the student number if you
knew the lowest and highest number.
Invalid numbers/non-existent numbers might be entered which are within
the range so would be accepted.
A range check on each part of the date of birth could be carried out.
Would prevent negative days/days greater than 31 being entered.
Would prevent months less than 1 or greater than 12 being entered.
Would prevent years less than 2000 or greater than 2001 from being
entered.
Would not prevent dates like 30/02/2000 or 31/06/2000 being entered.
Check digit can only be carried out on long strings of numbers – Student
number is not really long enough.
Check digit would pick up transposed numbers which none of the other
checks would.
Date of birth is not in correct format for a check digit to be used.
Format check could be used on date of birth nn/nn/nnnn.
Format check would not pick up nonsensical dates of birth such as
68/99/3000.
Format check would pick up data entry errors such as a three digit
day/month/single digit day/month/two digit year.

© UCLES 2017 Page 4 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) Three from: 3

Translates the whole program as one complete unit


Creates an executable file
Is able to report on a number of errors in the code after compilation
Does not need to be present in order to run the code
Can optimise source code to run as fast or as efficiently as possible.

6(b) Three from: 3

Translates each line of source code into an intermediate stage and then
executes that line/statement
Reports on errors as lines of source code are entered
Only a few lines of source code needs to be in memory at any one time
Some interpreters execute code within a 'virtual machine'
these have been designed to disallow code from directly accessing the
computer.

Question Answer Marks

7 Six from: 6

Sensors are used to feed data back to a computer


Naming of physical variables and the sensors/devices used to gather
data
Analogue data is converted into digital for the computer to process using
an analogue to digital converter
Computer stores readings in a table ready for processing
Computer plots graphs automatically
Computer calculates minimum and maximum temperature/rainfall/wind
speed/atmospheric pressure for the day/month/year so far
Computer outputs the results/graphs on screen/printer.

Question Answer Marks

8(a) Three from: 3

Involves using cell phone text/SMS messages to persuade people to


divulge their personal information
The text message may include a website URL, inviting the receiver to go
to the site
looks just like the actual bank’s website but is a fake website
The text message may include a telephone number that connects to an
automated voice response system/person asking for bank details
The smishing message usually contains something that demands the
target's immediate attention
The website then asks them to enter their personal/financial information.

© UCLES 2017 Page 5 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

8(b) Three from: 3

Installs a piece of malicious software/code on customer’s computer


Creates a fake website which looks like the actual bank’s website
Fraudster redirects genuine website’s traffic to own website
customer is now sending personal details to fraudster’s website
unknowingly.

Question Answer Marks

9 Six from: 6

The divide between people who have access to and the resources to use
new information/communication technology and those who do not
This technology can include the telephone, television, personal
computers and the internet
The divide between those who have the skills, knowledge and abilities to
use the technologies and those who do not
The digital divide can exist between those living in rural areas and those
living in urban areas
due to lack/expense of infrastructure in rural areas
The digital divide can exist between the educated and uneducated
The digital divide can exist between economic classes
The digital divide can exist between old and young people
as young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
May refer to inequalities between individuals, households, businesses, or
geographic areas
The divide between countries or regions of the world is referred to as the
global digital divide
The quality of connection to the internet may vary between
groups/countries
The price of connection to the internet may vary between
groups/countries
Can be overcome by:
Community teaching programmes to teach older people how to use
advanced technology
Giving cheap computers/laptops to school children from poor
backgrounds
Setting up cyber cafes in rural areas
Providing overseas aid to poor countries to purchase the technology.

Question Answer Marks

10(i) C Date_of_birth and: 2


Date as it is in the form dd/mm/yyyy 1 mark
3 bytes as it would be stored as an integer 1 mark

10(ii) D Gender and: 2


Boolean, there are only two entries 1 mark
1 byte as it could be set to True/False, –1/0 1 mark

© UCLES 2017 Page 6 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

10(iii) E Marriage_state and: 2


Text as it consists of letters/Lookup table as there are only three
options 1 mark
8 bytes Divorced is the longest entry, 8 characters long 1 mark

10(iv) F Number_of_children and: 2


Numeric, integer as can only have whole number of children 1 mark
3 bytes as it is stored as an integer 1 mark

Question Answer Marks

11 Six from: 6

Send emails to every person being invited informing them of the


conference
Rajvinder sends log in details to the directors/users
Uploads any necessary documents for the meeting
Sends a link to the website
Enter his user name and password (obtained from the provider)
Select a start time and end time
In the meeting area, type an agenda
Using the software select participants
Select appropriate meeting space/room
Select those participants who can enter the room
Choose those who can be presenters/those that can modify documents
Limit the participation of participants/mute volume/disable
messaging/disable cameras.

© UCLES 2017 Page 7 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

12 Discussion based on: 8

Benefits
Testing nuclear reactor designs using computer models avoids safety
problems
such as explosions/meltdowns
Testing nuclear reactor designs using computer models cuts costs
as do not have to pay as much money for workers/materials to replace
damaged reactors
Can obtain results in a short period of time regarding reactions that take
a long time in real life
Re-designing computer models is cheaper than re-building a nuclear
reactor
Researchers will have the tools to simulate scenarios that are hard to
observe in operating reactors

Drawbacks
Researchers will need to know how to apply simple modelling techniques
in some situations and more complicated ones in others
Models cannot always recreate exactly the real-world experiment
In order to carry out test efficiently researchers will need specialist
knowledge
of mechanical engineering/materials science/reactor physics
Most researchers who are specialists in one discipline will need to
retrain/extend their studies
which costs money
Not every possible variable may be included in the model
leading to inaccurate results.

Allow one mark for a reasoned conclusion.

Question Answer Marks

13 Four from: 4

Example of appropriate title


Appropriately labelled sectors including example
Percentages attached to sectors including examples
Number of students taking each course in each sector including
examples
Different colour sectors
Description of chart legend including example.

© UCLES 2017 Page 8 of 9


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

14 Eight from: 8

Inclusion of all fields mentioned in question


Must be text boxes or individual character boxes
Title space bigger than author, ISBN and borrower number similar size
and generally sensible spacing
Drop down dates for date borrowed or clear view of calendar
Radio buttons for borrowed (Y/N)
Navigation buttons
Help button/information on how to complete the form
Appropriate title
Appropriate white space and information fills the page.

Question Answer Marks

15(a) Customer record table Sales record table 4

ᴕ Invoice_number
ᴕ Customer_id 1
Item_number
Name
Item_description
Contact_phone
∞ Item_cost
Card_number
Customer_ref

All customer records and Sales records data with


correctly titled tables 1 mark
Primary key fields identified 1 mark
Relationship line between correct two fields 1 mark
One to many indicated 1 mark

15(b) Four from: 4

Customer_id is identified as the primary key in the customer record table


and Invoice_number as the primary key in the Sales record table
Add these two tables in the relationships view/option
Select Customer_id in customer records table and connect it to
Customer_ref in the Sales records table
Check/select relationship type is one to many
Ensure that relationship is saved.

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the May/June 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level and Cambridge Pre-U components, and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

1 4
A WAN is a Wireless Area Network.

A LAN is a Live Area Network.

A LAN covers a smaller geographical area than a WAN. 3

A WAN has a higher data transfer rate than a LAN.

Unlike a LAN, the signal does not deteriorate in a WAN.


A LAN does not need a router to connect computers
3
together.
A WAN experiences more data transmission errors than
3
a LAN.
A WAN has a lower bandwidth than a LAN. 3

The internet is an example of a LAN.

A WAN is more secure than a LAN.

Question Answer Marks

2 A knowledge base is a key component of an expert 4


3
system.
Experts do not need to make a judgement. They just
accept the results of the expert system.
The user interface is used for both input and output. 3

The rules base can contain IF THEN statements. 3


The inference engine searches the user interface to find
possible solutions.
An expert system is often used in car driving simulators.
An expert system is not as accurate as a single expert
would be.
A knowledge engineer is employed to create an expert
3
system.
An expert system never needs updating.

Expert systems always come up with exact solutions.

© UCLES 2017 Page 2 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

3 Three from: 1 mark each 4

Data that does not change


It can be read without being written back to a file/not changed when
written back
Limited amount of information in a static information source
because as soon as it is created it is difficult to have information added
to it
Static data tends to go out of date quickly.

Appropriate example such as a CD ROM contains static data. 1 mark

Question Answer Marks

4 Four from: 4

Read the text carefully to find/correct typographical errors/mistakes in


grammar/style/spelling
Printing a copy is sometimes better than reading on screen
Read the essay out loud
he will hear other problems that he may not see when reading silently
He could use a blank sheet of paper to cover up the lines below the one
he is reading
which keeps him from skipping ahead of possible mistakes
Use the search function of the computer to find mistakes he is likely to
make
Search for "it," for instance, if he confuses "its" and "it's", "there" for
"their" or "they're"
Check separately for each kind of error he is likely to make, moving from
the most to the least important
Read through once backwards, sentence by sentence
Read through again forward to be sure subjects and verbs agree.

© UCLES 2017 Page 3 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

5 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will describe each check and give benefits and drawbacks of
each check/consider different reasons for using each check.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will describe each check and give benefits and drawbacks of
checks/consider different reasons for using each check although
development of some of the points will be limited to benefits or
drawbacks.
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only describe checks, and give basic reasons. Answers
may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may include:

A range check could only be carried out on the student number if you
knew the lowest and highest number.
Invalid numbers/non-existent numbers might be entered which are within
the range so would be accepted.
A range check on each part of the date of birth could be carried out.
Would prevent negative days/days greater than 31 being entered.
Would prevent months less than 1 or greater than 12 being entered.
Would prevent years less than 2000 or greater than 2001 from being
entered.
Would not prevent dates like 30/02/2000 or 31/06/2000 being entered.
Check digit can only be carried out on long strings of numbers – Student
number is not really long enough.
Check digit would pick up transposed numbers which none of the other
checks would.
Date of birth is not in correct format for a check digit to be used.
Format check could be used on date of birth nn/nn/nnnn.
Format check would not pick up nonsensical dates of birth such as
68/99/3000.
Format check would pick up data entry errors such as a three digit
day/month/single digit day/month/two digit year.

© UCLES 2017 Page 4 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

6(a) Three from: 3

Translates the whole program as one complete unit


Creates an executable file
Is able to report on a number of errors in the code after compilation
Does not need to be present in order to run the code
Can optimise source code to run as fast or as efficiently as possible.

6(b) Three from: 3

Translates each line of source code into an intermediate stage and then
executes that line/statement
Reports on errors as lines of source code are entered
Only a few lines of source code needs to be in memory at any one time
Some interpreters execute code within a 'virtual machine'
these have been designed to disallow code from directly accessing the
computer.

Question Answer Marks

7 Six from: 6

Sensors are used to feed data back to a computer


Naming of physical variables and the sensors/devices used to gather
data
Analogue data is converted into digital for the computer to process using
an analogue to digital converter
Computer stores readings in a table ready for processing
Computer plots graphs automatically
Computer calculates minimum and maximum temperature/rainfall/wind
speed/atmospheric pressure for the day/month/year so far
Computer outputs the results/graphs on screen/printer.

Question Answer Marks

8(a) Three from: 3

Involves using cell phone text/SMS messages to persuade people to


divulge their personal information
The text message may include a website URL, inviting the receiver to go
to the site
looks just like the actual bank’s website but is a fake website
The text message may include a telephone number that connects to an
automated voice response system/person asking for bank details
The smishing message usually contains something that demands the
target's immediate attention
The website then asks them to enter their personal/financial information.

© UCLES 2017 Page 5 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

8(b) Three from: 3

Installs a piece of malicious software/code on customer’s computer


Creates a fake website which looks like the actual bank’s website
Fraudster redirects genuine website’s traffic to own website
customer is now sending personal details to fraudster’s website
unknowingly.

Question Answer Marks

9 Six from: 6

The divide between people who have access to and the resources to use
new information/communication technology and those who do not
This technology can include the telephone, television, personal
computers and the internet
The divide between those who have the skills, knowledge and abilities to
use the technologies and those who do not
The digital divide can exist between those living in rural areas and those
living in urban areas
due to lack/expense of infrastructure in rural areas
The digital divide can exist between the educated and uneducated
The digital divide can exist between economic classes
The digital divide can exist between old and young people
as young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
May refer to inequalities between individuals, households, businesses, or
geographic areas
The divide between countries or regions of the world is referred to as the
global digital divide
The quality of connection to the internet may vary between
groups/countries
The price of connection to the internet may vary between
groups/countries
Can be overcome by:
Community teaching programmes to teach older people how to use
advanced technology
Giving cheap computers/laptops to school children from poor
backgrounds
Setting up cyber cafes in rural areas
Providing overseas aid to poor countries to purchase the technology.

Question Answer Marks

10(i) C Date_of_birth and: 2


Date as it is in the form dd/mm/yyyy 1 mark
3 bytes as it would be stored as an integer 1 mark

10(ii) D Gender and: 2


Boolean, there are only two entries 1 mark
1 byte as it could be set to True/False, –1/0 1 mark

© UCLES 2017 Page 6 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

10(iii) E Marriage_state and: 2


Text as it consists of letters/Lookup table as there are only three
options 1 mark
8 bytes Divorced is the longest entry, 8 characters long 1 mark

10(iv) F Number_of_children and: 2


Numeric, integer as can only have whole number of children 1 mark
3 bytes as it is stored as an integer 1 mark

Question Answer Marks

11 Six from: 6

Send emails to every person being invited informing them of the


conference
Rajvinder sends log in details to the directors/users
Uploads any necessary documents for the meeting
Sends a link to the website
Enter his user name and password (obtained from the provider)
Select a start time and end time
In the meeting area, type an agenda
Using the software select participants
Select appropriate meeting space/room
Select those participants who can enter the room
Choose those who can be presenters/those that can modify documents
Limit the participation of participants/mute volume/disable
messaging/disable cameras.

© UCLES 2017 Page 7 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

12 Discussion based on: 8

Benefits
Testing nuclear reactor designs using computer models avoids safety
problems
such as explosions/meltdowns
Testing nuclear reactor designs using computer models cuts costs
as do not have to pay as much money for workers/materials to replace
damaged reactors
Can obtain results in a short period of time regarding reactions that take
a long time in real life
Re-designing computer models is cheaper than re-building a nuclear
reactor
Researchers will have the tools to simulate scenarios that are hard to
observe in operating reactors

Drawbacks
Researchers will need to know how to apply simple modelling techniques
in some situations and more complicated ones in others
Models cannot always recreate exactly the real-world experiment
In order to carry out test efficiently researchers will need specialist
knowledge
of mechanical engineering/materials science/reactor physics
Most researchers who are specialists in one discipline will need to
retrain/extend their studies
which costs money
Not every possible variable may be included in the model
leading to inaccurate results.

Allow one mark for a reasoned conclusion.

Question Answer Marks

13 Four from: 4

Example of appropriate title


Appropriately labelled sectors including example
Percentages attached to sectors including examples
Number of students taking each course in each sector including
examples
Different colour sectors
Description of chart legend including example.

© UCLES 2017 Page 8 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2017
PUBLISHED

Question Answer Marks

14 Eight from: 8

Inclusion of all fields mentioned in question


Must be text boxes or individual character boxes
Title space bigger than author, ISBN and borrower number similar size
and generally sensible spacing
Drop down dates for date borrowed or clear view of calendar
Radio buttons for borrowed (Y/N)
Navigation buttons
Help button/information on how to complete the form
Appropriate title
Appropriate white space and information fills the page.

Question Answer Marks

15(a) Customer record table Sales record table 4

ᴕ Invoice_number
ᴕ Customer_id 1
Item_number
Name
Item_description
Contact_phone
∞ Item_cost
Card_number
Customer_ref

All customer records and Sales records data with


correctly titled tables 1 mark
Primary key fields identified 1 mark
Relationship line between correct two fields 1 mark
One to many indicated 1 mark

15(b) Four from: 4

Customer_id is identified as the primary key in the customer record table


and Invoice_number as the primary key in the Sales record table
Add these two tables in the relationships view/option
Select Customer_id in customer records table and connect it to
Customer_ref in the Sales records table
Check/select relationship type is one to many
Ensure that relationship is saved.

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 0 4 1 9 6 7 7 1 5 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory February/March 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NF) 134291/3
© UCLES 2017 [Turn over
2

1 Tick the four most accurate statements regarding the quality of information.

The more information that is collected the higher its quality.

Data collected from a third party always becomes high quality information.

The accuracy of the information collected affects its quality.

Information which costs a lot to collect is always high quality information.

A great deal of detail can sometimes lead to poor quality information.

Irrelevant information leads to poor quality information.


The problems arising from a lack of good quality information can be overcome by
making your filters more refined.
Good quality of information is always obtained from small groups of people.

Information collected 100 years ago is always good quality information.

The more complete the collected information is, the better its quality.
[4]

2 Tick the four statements which most accurately refer to encryption.

Encryption is used by hackers to discover passwords.

Encrypting a hard disk prevents viruses from deleting the information.

Encryption always makes use of a public key and a private key.

Encryption is the scrambling of the text in a message.


Encryption is the process of encoding messages in such a way that only
authorised parties can understand them.
Encryption prevents messages from being intercepted.

Encrypted information can only be understood if decrypted.

Encryption has speeded up internet browsing by using secure sites.


The recipient can only decrypt the message with the key provided by the
originator.
All memory sticks are encrypted.
[4]

© UCLES 2017 9626/12/F/M/17


3

3 A school secretary has been handed some data by a student:

Prasad, Anoushka, SR132516, 52, 01/09/2000

Explain why they are regarded as just items of data. In your explanation give a possible context
for the data and describe how this would make the data become information.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2017 9626/12/F/M/17 [Turn over


4

4 There are many types of user interface in computerised systems. Three types are a graphical user
interface, a dialogue interface and a gesture based interface.

Evaluate these types of user interface.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/12/F/M/17


5

5 Avtar is a recently appointed network manager in a school. In his role he will need to use a variety
of utility software.

(a) Describe, in detail, each of the following utilities.

(i) anti-virus software:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

(ii) data compression:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(iii) disk defragmentation:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2017 9626/12/F/M/17 [Turn over


6

(iv) disk formatting:

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(b) There are a number of computers in the school which are not networked at the moment.
Discuss the advantages and disadvantages of creating a new network using these computers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2017 9626/12/F/M/17


7

6 Amisha, the Management Information System (MIS) manager has just purchased some MIS
software for her company.

Explain how it can be used by Amisha to help the company run more efficiently.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/12/F/M/17 [Turn over


8

7 Atat Iron Ltd uses computers to process its payroll. The company pays its workers weekly which
involves the updating of a master file.

Two sets of data are shown below.


The first set represents part of a transaction file containing workers’ ID numbers and the hours
worked by those workers in a particular week.
The second set represents part of the master file used by the company. This shows the workers’
ID numbers, departments they work in and the rate per hour at which they are paid in Indian
Rupees ( ).

Transaction file Master file

Workers_ID_number Hours_worked Workers_ID_number Department Hourly_rate ( )

047006 40 031597 Extrusion 62


486439 40 047006 Cold rolling 55
592786 38 131654 Extrusion 62
758789 40 235804 Foundry 50
512759 37 239412 Foundry 50
869891 40 243303 Hot rolling 58
471584 38 471584 Cold rolling 55
131654 40 486439 Tube production 65
243303 40 500368 Extrusion 62
235804 35 512759 Tube production 65
592786 Foundry 50
758789 Tube production 65
869891 Extrusion 62
942378 Hot rolling 58

(a) Describe what processes must happen before the updating can begin.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2017 9626/12/F/M/17


9

(b) Using this data, explain how a transaction file is used to update a master file in a payroll
system. You may assume that the only transaction being carried out is the calculation of the
weekly pay before tax and insurance deductions.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2017 9626/12/F/M/17 [Turn over


10

(c) When a new worker is added to the master file, the data must be validated. His hourly rate
will be 50 Rupees.

Without using a type check, describe three other validation checks you would develop to
make sure all the data entered is sensible.

1. ..............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2. ..............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3. ..............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2017 9626/12/F/M/17


11

8 Below is part of a spreadsheet Jose has created to model his personal finances.

 A B
1 $2,600 Wages/salary
2
3 $120 Utilities
4 $100 Satellite/TV
5 $80 Phone
6 $30 Pet food
7 $1,000 Mortgage/rent
8 $80 Internet
9 $100 Insurance
10 $75 Hair/beauty
11 $550 Groceries
12 $150 Eating out
13 $100 Clothing
14 $40 Cinema
15 $160 Car/travel
16
17 $2,585 Total outgoings
18
19 $15 Balance

Using only the sort feature explain how you would be able to get the following values in the given
cells.

(i) $80 in cell A11 with Internet in cell B11 and $1,000 in cell A3.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

(ii) $100 in cell A8 with Clothing in cell B8.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [3]

© UCLES 2017 9626/12/F/M/17 [Turn over


12

9 Theresa has created a database query which searches for the surname “Johnson”.
Surjit has told her that this is a static parameter query.

Explain what is meant by static parameter query and why she should change to using a dynamic
parameter query.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/12/F/M/17


13

10 Below is an extract from a database of students who have chosen to study Maths at AS Level. The
database is in unnormalised (0NF) form.

Student
Name Second subject Third subject
number
1001 Eashan Wadhwa Chemistry Physics

1002 Karan Bansal Physics Chemistry

1003 Manan Malik Chemistry Biology

1004 Neel Bhatia Biology Chemistry

1005 Ridhima Shekhar History Biology

1006 Rohin Pannu Geography History

1007 Saransh Anand History Geography

1008 Shraddha Aggarwal Biology Chemistry

1009 Rekha Pooja Physics Chemistry

1010 Sundar Rakshana Physics Chemistry

Describe the characteristics of the data above which make it unnormalised and explain how it can
be transformed into first normal form (1NF).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/12/F/M/17 [Turn over


14

11 Below is an extract from a spreadsheet showing the wages paid in one week to a group of workers.
Their wages depend on the type of job they do as well as the number of hours worked. Cells C2 to
E4 contain the data which is referred to in the lower part of the spreadsheet.

 A B C D E F G
1 Standard rate per hour
2 L Labourer 55
3 Se Semi-skilled 65
4 Sk Skilled 75
5
Hours worked this Rate per hour Wage paid
Worker ID Job Code Job type
6 week paid this week
7
8 12478L L Labourer 40 55 2200
9 13691R Se Semi-skilled 38 65 2470
10 21463R Se Semi-skilled 40 65 2600
11 29816M L Labourer 36 55 1980
12 36479L Sk Skilled 34 75 2550
13 49786R Sk Skilled 40 75 3000
14 52376M Se Semi-skilled 36 65 2340
15 18964L L Labourer 35 55 1925
16 13578R L Labourer 40 55 2200
17 38945M L Labourer 40 55 2200
18 36249M Se Semi-skilled 40 65 2600
19

(a) Write down the formula which should be used in cell C8 in order to display the Job type using
the Job Code in the preceding column. The formula should be in a form that can be easily
replicated.

= ................................................................................................................................................

.............................................................................................................................................. [5]

You can use the space below for any working you need.

© UCLES 2017 9626/12/F/M/17


15

(b) The spreadsheet contains different formulae in different columns.

Explain the other formulae used in the spreadsheet which enable the data in the Wage paid
this week column to be displayed. The formulae should be in a form so that they can be easily
replicated.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2017 9626/12/F/M/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/12/F/M/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 8 7 2 0 8 7 6 5 6 0 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory February/March 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all the questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (RW/FC) 134349/2
© UCLES 2017 [Turn over
2

1 A software application has been fully tested so that it is error-free and has been implemented.
There are no new situations likely to arise but the management wants to ensure that the software
is working as well as it should.

Explain, with reasons, how you would maintain the software application.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2017 9626/32/F/M/17


3

2 Wearable, or body-borne, computers are miniature electronic devices worn by the bearer.

Analyse the use of wearable computers by the police.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/F/M/17 [Turn over


4

3 Fig. 1 shows a sequence of tasks that are required to complete a project.

Task 2 Task 5

Start of Finish of
Project Project

Task 1 Task 3 Task 4

Fig. 1

The duration of each task is shown in this table:

Task 1 2 3 4 5
Duration (days) 3 5 7 2 4

There are three paths through this set of tasks.

(a) Use the information given in Fig. 1 and in the table to determine the critical path through the
sequence of tasks.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/32/F/M/17


5

(b) Each task can have an extra amount of time allowed over its stated duration before it causes
the project to be delayed. This is the ‘float’.

Explain how you would calculate the float for each of the tasks in the project.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/32/F/M/17 [Turn over


6

4 A website advertising a tourist resort uses both bitmap and vector graphics.

Evaluate the suitability of these types of graphics for use on the website.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/F/M/17


7

5 Global positioning systems (GPS) are used by navigation devices to allow drivers of cars to find
locations and destinations.

(a) Describe how GPS signals from satellites are used by navigation devices to determine a
location.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2017 9626/32/F/M/17 [Turn over


8

(b) Describe the factors that could degrade a GPS signal, when it is transmitted to a navigation
device, and affect the accuracy of the location found by that device.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 9626/32/F/M/17


9

6 A customer in a restaurant can pay the bill with a credit card using a mobile chip and pin reader
carried by a waiter.

Describe the computer processing involved in the payment of the bill by credit card using the
mobile chip and pin reader.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/F/M/17 [Turn over


10

7 Electronic data exchange is often called electronic data interchange. An online retailer and its
trading partners use electronic data interchange (EDI).

(a) Define EDI.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) The retailer has prepared an order that has to go to a supplier. When the supplier has received
the order, an invoice asking for payment for the goods has to go back to the retailer.

Explain how you would use EDI for these transactions.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2017 9626/32/F/M/17


11

8 Packet switching is used to transfer data around networks.

Discuss the benefits and drawbacks of packet switching.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2017 9626/32/F/M/17 [Turn over


12

9 JavaScript can be embedded in the code of web pages to add interactivity to a page.

Jonas uses JavaScript code to store, list and display the names of cities on a web page.

(a) Two methods of storing the names are shown below.

Method 1:

var city1 = "London";


var city2 = "Cambridge";
var city3 = "Oxford";
var city4 = "Manchester";

Method 2:

var city = ["London", "Cambridge", "Oxford", "Manchester"];

Explain why storing the names using Method 2 is more suitable for storing large numbers of
cities.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/32/F/M/17


13

(b) Jonas has added some lines to the JavaScript code:

/*
The code below stores the list of cities.
*/
var city = ["London", "Cambridge", "Oxford", "Manchester"];

Explain why Jonas would have added the new code to the script.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Jonas wants to extract ‘Oxford’ from the list in the code below to display it on the web page.

var city = ["London", "Cambridge", "Oxford", "Manchester"];

Write a line of JavaScript code to access the list and store the city name.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) Write a loop in JavaScript code to extract and display the first three city names.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2017 9626/32/F/M/17 [Turn over


14

10 A new computer system is to be developed for a factory. You have been asked to gather
information from the managers, assembly-line workers and clerical staff about the current system.
The managers can be available at any time, the assembly-line workers must not be interrupted at
any time and do not like taking work home, and the clerical staff are very busy during their working
hours and do not like being watched.

Describe, with reasons, the method of research you would use to gather information from each
group.

(i) Managers:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(ii) Assembly-line workers:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(iii) Clerical staff:

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]
© UCLES 2017 9626/32/F/M/17
15

BLANK PAGE

© UCLES 2017 9626/32/F/M/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/32/F/M/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory March 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the March 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

1 The more information that is collected always improves its quality. 4

Data collected from a third party always becomes high quality


information.
The accuracy of the information collected affects its quality. 3
Information which costs a lot to collect is always high quality
information.
A great deal of detail can sometimes lead to poor quality information. 3
Irrelevant information leads to poor quality information. 3
The problems arising from a lack of good quality information can be
overcome by making your queries more refined.
Good quality of information is always obtained from small groups of
people.
Information collected 100 years ago is always good quality
information.
The more complete the collected information is, the better its quality. 3

Question Answer Marks

2 Encryption is used by hackers to discover passwords. 4

Encrypting a hard disk prevents viruses from deleting the information.


Encryption always makes use of a public key and a private key.
Encryption is the scrambling of the text in a message. 3
Encryption is the process of encoding messages in such a way that
3
only authorised parties can understand them.
Encryption prevents messages from being intercepted.
Encrypted information can only be understood if decrypted. 3
Encryption has speeded up internet browsing by using secure sites.
The recipient can only decrypt the message with the key provided by
3
the originator.
All memory sticks are encrypted.

© UCLES 2017 Page 2 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

3 Five from: 5

They are just a collection of text, numbers and symbols«


«with no meaning
A possible context is that the data is about the student and represents«
«their family name, first name, student id, their latest maths mark and their date
of birth (three marks for five reasonable fields, two marks for four reasonable
fields, one mark for two or three reasonable fields)

Question Answer Marks

4 Eight from: 8

Users with physical handicaps may not be able to use a keyboard or mouse«
«or control their limbs accurately«
«could speak into a microphone to control a device
For reasons of hygiene a doctor may not be allowed to touch a display or device
Appropriate gestures/speaking into a microphone are/is a more hygienic way to
control the device
Gestures may be a quicker way of initiating a response from a device
Certain gestures may not be socially acceptable which is not a problem with the
other interfaces
Some gestures may be unintentional but still initiate a reaction from the device
Dialogue interface allows hands free control ensuring safety when driving«
«whereas gestures/GUI would need at least one hand to leave the steering
wheel
Dialogue interface can be more expensive to develop compared with a GUI
Dialogue interface may not operate reliably if there is background noise or user
has a cold/strong dialect/accent«
«whereas GUI/gestures will still be reliable
GUIs tend to be more accurate than gestures/dialogue
Dialogue interface often requires a training session with user«
«GUI/gestures can be taught through manuals
Gesture based is less effective when several users/background movement
involved

One mark is available for an appropriate reasoned opinion

© UCLES 2017 Page 3 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

5(a)(i) Anti-virus software – Four from: 4

Software used to prevent, detect and remove malicious software


Can protect from: malicious Browser Helper Objects (BHOs), browser hijackers,
ransomware, keyloggers, backdoors, rootkits, Trojan horses, worms, malicious
LSPs, dialers, fraudtools, adware and spyware (must have at least two)
Signature-based detection compares the contents of a file to its database of
known malware signatures
Heuristic-based detection detects malware based on characteristics typically
used in known malware code
Behavioural-based detection: is based on the behavioural fingerprint of the
malware at run-time«
«is only able to detect malware after they have starting doing their malicious
actions
Sandbox detection based on behavioural-based detection«
«but doesn’t detect the behavioural fingerprint at run time«
«it executes the programs in a virtual environment logging what actions the
program performs
Gives user options to delete or quarantine files/asks if user wants virus deleted
Scans computer/files/disk for viruses

5(a)(ii) Data compression – Three from: 3

Encoding information using fewer bits than the original representation


Can be either lossy or lossless
Lossless compression reduces number of bits by identifying repeated patterns
of data
No information is lost in lossless compression
Lossy compression reduces number of bits by identifying unnecessary
information
Storage space required for file/file size is reduced

5(a)(iii) Disk defragmentation – Three from: 3

Organises the contents of the disk into the smallest number of contiguous
regions/fragments
Attempts to create larger regions of free space using compaction
Some defragmentation utilities try to keep smaller files within a single directory
together
The movement of the hard drive's read/write heads over different areas of the
disk when accessing fragmented files is slower«
«compared to accessing the entire contents of a non-fragmented file
sequentially

5(a)(iv) Disk formatting – Two from: 2

Prepares a data storage device for initial use


Organises the tracks on a disk into sectors
A new disk medium is fully prepared in order to store files
The first stage is low-level formatting followed by«
«partitioning which makes the data storage device visible to an operating
system«
followed by high-level formatting which generates a new file system

© UCLES 2017 Page 4 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

5(b) To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will analyse and evaluate both sides of the argument and
discuss/consider different reasons as to why the computers should be
networked or not
The issues raised will be justified
The information will be relevant, clear, organised and presented in a structured
and coherent format
Subject specific terminology will be used accurately and appropriately
There will need to be a reasoned conclusion to gain full marks

Level 2 (4–6 marks)


Candidates will analyse and evaluate both sides of the argument and
discuss/consider different reasons as to why the computers should be networked
or not although development of some of the points will be limited to one aspect of
the question
For the most part the information will be relevant and presented in a structured
and coherent format
Subject specific terminology will be used appropriately and for the most part
correctly
There may be a conclusion

Level 1 (1–3 marks)


Candidates may only address one side of the argument, and give basic reasons
Answers may be simplistic with little or no relevance
There will be little or no use of specialist terms

Level 0 (0 marks)
Response with no valid content

Advantages may include e.g.:

Easier for students to share work/files in group projects


Easier for network manager to roll out new software
Easier for teachers to monitor students when working
Peripherals can be shared so fewer needed leading to lower cost in the future
Can access the internet more easily
School intranet would become available to all students more
frequently

Disadvantages may include e.g.:

Easier for students to share work which could lead to copying


Bigger server may be required to cope with extra computers so more
expensive
Extra network points may be needed which leads to more cost
If the server breaks down student work might become inaccessible
Viruses are easier to transmit from one computer to another

© UCLES 2017 Page 5 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

6 Six from: 6

Provides past, present and prediction information


Helps in decision making
MIS manager typically analyses business problems
MIS manager designs and maintains computer applications to solve the
organisation's problems
Helps with project management
Managers use management information systems to gather and analyse
information about various aspects of the organisation«
«such as personnel, sales, inventory and production
Management information systems are used to create reports on aspects such as
sales, revenue and production
Management information systems are used to create charts (on aspects such as
sales, revenue and production)
These reports are provided at regular intervals to managers at all levels to help
them evaluate their companies' performance
By comparing daily, weekly or monthly reports to previous reports, managers are
able to spot trends, such as revenue growth or reduction
By creating charts, can see trends such as revenue growth or reduction

Question Answer Marks

7(a) Two from: 2

Transaction file is validated


Transaction file must be sorted«
«in same order as master file/sorted on Workers ID number

7(b) Six from: 6

First record in the transaction file read belonging to 047006


Reads first record in the old master file belonging to 031597
These two records are compared
If records do not match computer writes master file record to new master file
Records do not match so next record of master file is read 047006
If it matches transaction is carried out
Computer calculates the pay rate of pay × no. of hours worked, 55 × 40«
«using rate of pay 55 from master file«
«using hours worked 40 from transaction file
Processed record is written to new master file
Next record 131654 is read from transaction file then compared to next master
file record 131654
This continues until the last record from the transaction file record 869891 is
read
After processing the last record of the transaction file 869891 all the remaining
old master file records are written to the new master file in this case, one record
942378

© UCLES 2017 Page 6 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

7(c) Three matched pairs from:

Length check on Workers ID number 1

Must be exactly 6 characters long 1

Lookup check on Department 1

Must be one of Foundry, Cold rolling, Tube production, Extrusion or Hot rolling 1

Range check on hourly rate 1

E.g. be between 50 and 65 1

Question Answer Marks

8(i) Three from: 3

Select A3:B15«
«Sort in descending order of column A«
«Add a level«
«Sort in ascending order of column B

8(ii) Three from: 3

Select A3:B15«
«Sort in ascending/descending order of column A
«Add a level
«Sort in ascending order of column B

Question Answer Marks

9 Static parameter query is a query that is fixed 1

Five from: 5

Every time that the query is run it will search for the surname “Johnson”
If Theresa wants to look for another surname she will need to open up the query
in design view«
«and change the surname criteria to that name
With a dynamic parameter query she could type in a different surname/data
each time
Every time the query is run a dialogue box would appear asking her to type in
the surname
This would save the time of designing the query every time she wanted to find a
surname

© UCLES 2017 Page 7 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

10 Two from: 6

Data such as Second subject and Third subject is repeated


Data is non-atomic as Name can be further subdivided

Four from:

Split name into first name and second name


Each record to have two entries, one per subject e.g.

Student
First name Second name Subject
number
1001 Eashan Wadhwa Chemistry
1001 Eashan Wadhwa Physics

There will still be columns with the same data in some rows but each row as a
whole will be unique

Create a new table called subject


Each subject would have to have a unique id
Fields would be subject name and subject_id

Question Answer Marks

11(a) =VLOOKUP(B8,C$2:D$4,2) 5

VLOOKUP() – 1 mark
B8, – 1 mark
C2:D4 – 1 mark
2 – 1 mark
Use of appropriate absolute referencing – 1 mark

© UCLES 2017 Page 8 of 9


9626/12 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

11(b) Six from: 6

In order to calculate the wage paid this week the Rate per hour paid has to be
known then is multiplied by the hours worked this week– 1 mark

Cell E8 should contain the rate per hour paid for a labourer – 1 mark

=VLOOKUP(B8,C$2:E$4,3)

VLOOKUP(B8«) – 1 mark
C2:E4 – 1 mark
3 – 1 mark
Use of appropriate absolute referencing in VLOOKUP – 1 mark

Involves looking up Job Code in cells C2 to E4 and returns rate per hour from
third column/column E

Cell F8 should contain wage paid this week which is hours worked multiplied by
rate per hour – 1 mark

D8*E8 – 1 mark

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory March 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge will not enter into discussions about these mark schemes.

Cambridge is publishing the mark schemes for the March 2017 series for most Cambridge IGCSE®,
Cambridge International A and AS Level components and some Cambridge O Level components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

1 Five from: 5

Because it is error-free, corrective maintenance is not needed


Because there are no new situations likely to arise, adaptive
maintenance is not needed
Perfective maintenance is needed to modify the code
...enhance/add to the software capabilities to increase its
usefulness
Delete unused/obsolete functions to reduce the complexity/code
size/resource requirements
Optimise the code to increase functional speed

Question Answer Marks

2 Eight from: 8

Benefits:
(Body worn) video cameras used to record incidents for later use
in court/enquiry
Optical (head-mounted) technology to display information is in a
similar format to a smartphone/act as a smartphone so is
familiar
Operated hands-free via voice activation
Wrist-worn computers/smartphones for access to
communications systems
Wi-Fi-enabled/wireless connected clothing to track movements
in real-time/connect peripherals
...monitor vital signs of officer
...maintaining constant communications with others

Drawbacks:
Reliance on computers can remove elements of human
judgment
Implementation can be expensive since this is an emerging
technology
Can lead to invasions of privacy for user and third parties...
...location and other details can be used to track the user
Possibility of wearable computers being ‘hacked’ and data
stolen/computers manipulated
Breakdown in communications systems can lead to system
failure

Max 6 for all benefits or all drawbacks


1 mark available for a reasoned conclusion/opinion

© UCLES 2017 Page 2 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

3(a) Six from: 6

1 mark for correct identification of critical path


2 marks for each correctly calculated path

Path 3 is the critical path


Path 1: start Task 1 Task 3 Task 4 finish = 3+7+2 = 12
Path 2: start Task 2 Task 5 finish = 5+4 =9
Path 3: start Task 2 Task 5 Task 3 Task 4 = 5+4+7+2 = 18

3(b) Four from: 4

Each task on critical path has float of 0...


..tasks 2, 3, 4, and 5
Next longest path is path 1 with tasks 1, 3 and 4....
..3 and 4 are on critical path so their float is still 0
..so task 1 has float of critical path duration (16) minus Duration
of path 1 (12) giving float of 4

© UCLES 2017 Page 3 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

4 Answers/Indicative Level of Response 8


content
This question to be Level 3 (7–8 marks)
marked as a Level of
Response. Candidates will evaluate in
detail the suitability of both
Answers may make bitmap and vector graphics
reference to e.g.: for use on the website.
The information will be
Photo-realism: bitmaps are relevant, clear, organised
comprised of small pixels so and presented in a
the bitmap is the most structured and coherent
suitable format for photo- format.
realistic images or images There will be a reasoned
with high amounts of fine conclusion/opinion.
detail. The vector image, on Subject specific terminology
the other hand, does not will be used accurately and
possess the same kinds of appropriately.
photo-realistic capabilities
because it is comprised of Level 2 (4–6 marks)
larger objects and cannot
achieve the kind of fine Candidates will explain the
detail that is necessary for suitability of both bitmap and
photo-realism. vector graphics for use on
the website.
Scalability: vector images For the most part, the
are made of mathematically information will be relevant
defined objects so sizes can and presented in a
be easily manipulated with structured and coherent
little to no loss in the quality format.
of the image. The objects There may be a reasoned
within a vector image are re- conclusion/opinion.
rendered at a greater or Subject specific terminology
smaller scale to provide will be used appropriately
consistently smooth edges. and for the most part
Bitmaps are more difficult to correctly.
scale because changing the
size of a bitmap requires a Level 1 (1–3 marks)
complete rearrangement of Candidates will describe the
the pixels. An enlarged suitability of bitmap and/or
bitmap is likely to appear vector graphics for use on
blurry, or “pixelated,” the website.
meaning that the different Answers may be in the form
pixels of the image have of a list.
become visible. There will be little or no use
of specialist terms.
Shape: a bitmap image
always has four straight Zero marks: Response with
edges while vector images no valid content
can be any shape.

© UCLES 2017 Page 4 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

Answers/Indicative Level of Response


content
File size: complex vector
images can have a very
large file size due to the
complex instructions needed
to create them; the size of
the file is not dependant on
the size of the image: small
complex images can have a
large file size; bitmap
images can be large but can
be compressed.

Conversion between file


types: the most common file
type for bitmap web images
are jpeg or gif, and
conversion to these is simple
without loss of quality;
conversion of vector images
often results in more loss of
quality.

© UCLES 2017 Page 5 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

5(a) Eight from: 8

(Civilian) signals from satellite travel by line of sight to navigation


device/ receiver
Use L1/1575.42 MHz in UHF band
Satellites are Low Earth Orbit/LEO
Signal contains ID code of the satellite
...and status/health information
...and current date and time from atomic clock in the satellite
...and almanac data about where each GPS satellite is at any
point in time
Navigation device/ receiver must lock to (at least) 2 satellites to
calculate 2D position (i.e. latitude and longitude)
To 4 or more (usually 4 to 7) satellites to calculate 3D position
(i.e. latitude, longitude and altitude/elevation)
Using trilateration techniques
Calculation by finding intersect point by timing the signals from
the satellites

5(b) Five from: 5

Atmospheric/ionosphere/ troposphere delays slowing the


satellite signal slows as it passes through the atmosphere
Signal multipath errors as the GPS signal is reflected off objects
before it reaches the receiver
...increases the travel time of the signal
Clock errors in the receiver because the built-in clock is not as
accurate as the atomic clocks on board the GPS satellites
Orbital errors ( ephemeris errors) of the satellite's reported
location
The number of satellites visible may be too few because
buildings/terrain/dense foliage may block the signal reception
electronic interference can block the signals
...causing position errors /no position reading
...GPS units usually will not work indoors, underwater or
underground
Satellite geometry/shading because the relative position of the
satellites at any given time is not ideal for signal reception by the
receiver
...the satellites should be located at wide angles relative to each
other
...poor geometry occurs when the satellites are located in a
line/tight grouping
Intentional degradation of the satellite signal by the
operator/owner of the satellites
...to prevent military adversaries from using the highly accurate
GPS signals

© UCLES 2017 Page 6 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

6 Eight from: 8

Reader communicates via secure wireless connection with


restaurant base-station
Base station communicates with bank computers
Mobile reader reads the data from the card
Requests input of PIN from customer
PIN checked/validated against stored PIN
Request sent to restaurant’s bank to determine the cardholder’s
bank/issuing bank
Request sent to card issuer/bank to authorise the transaction
...authorisation code sent to restaurant’s bank if credit is
available
Credit card is validated/credit available
...if valid/available then transaction can proceed
...if not valid/available then transaction is refused
If transaction can proceed the amount of the transaction is
deducted from the cardholder’s account
Receipt is printed from the mobile reader

Question Answer Marks

7(a) Three from: 3

The computer-to-computer
Exchange of business documents
Using a standard electronic format
Between business partners

7(b) Five from: 5

Prepare the documents to be sent


Collect/organise the data via human interface screens/typing
Extract from databases/spreadsheets/output from stock
control/purchasing systems into data files
Translate the documents into EDI format
Convert internal data into EDI standard format
Transmit the EDI documents to trading partner
Use VPN/secure private network
Via an EDI network provider that connects the trading partners
together

© UCLES 2017 Page 7 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

8 Eight from e.g.: 8

Benefits of Packet Switching include e.g.:


Makes very efficient use of the network as communication lines
are shared
Data packets can be routed around unusable nodes/parts of the
network so if part of network/node is faulty/not working packets
can still reach destination
The network only has to expand slowly with increase in users
compared to circuit switching

Drawbacks of Packet Switching:


The packaging of the data changes each time a packet is
switched so there is a time overhead/latency
Can cause a problem for time-critical information such as an
emergency signal/video streaming
Small data packages are inefficiently packaged (e.g. a data
package of 600 bytes uses two packets of 512 bytes plus the
address information)

Max 6 for all benefits and drawbacks


1 mark available for a reasoned conclusion/opinion

Question Answer Marks

9(a) Four from: 4

Method 2 uses an array...


....which stores multiple values in a single variable
More suitable for storing large numbers of items/data items as it
reduces the complexity of the code
Increases the code easier to understand
Increases the execution speed of the code
Method 2 can be looped through using an iterative function
...to find a specific data item

9(b) Two from: 2

Jonas wanted to explain/add comments to the code/what the


line of code means/is for
To make it clear that the code referred to a list of the cities
Ensures that the explanation/comment was ignored by the web
browser
To make the code more readable/understandable

9(c) A suitable line of code would be: var place = city(2) 3

Three from:

var =1 mark
plus suitable variable name to store city e.g. place =1 mark
= city(2) =1 mark

© UCLES 2017 Page 8 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2017
PUBLISHED

Question Answer Marks

9(d) Suitable code would be: 4

for (b = 0; b <= 3; b++) {


document.write (city (b));
}

Marks, four from:

for () 1 mark
suitable var names 1 mark
count from to 0 to 2 (b from 0 to <=3) 1 mark
adding 1 inside loop (b++) 1 mark
displaying the result of loop 1 mark

Question Answer Marks

10(i) Three from: 3

Interview face-to-face with managers asking about their


views/opinions of the current system
Managers can be available for in depth discussion/additional
questions
Not many managers, so time is not a constraint/consideration

10(ii) Three from: 3

Observation of the assembly workers to avoid disturbing/


distracting them at/from their work
Observers can see the process first hand/for themselves
Observers do not need to understand the technical language of
the process

10(iii) Three from: 3

Using questionnaires so that clerical staff can take them away


and complete in own time
Questionnaires can be anonymously returned/completed
Cannot use observation as the clerical staff behaviour could
change
Too many clerical staff to interview
Clerical staff can remain anonymous

Total: 90

© UCLES 2017 Page 9 of 9


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 0 3 9 7 6 1 6 0 0 2 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (NF/SG) 133655/2
© UCLES 2017 [Turn over
2

1 (a) Tick the most accurate statement about the use of a compiler.

A compiler executes a high-level program one statement at a time before translating the
next statement.
A compiler converts object code into source code.

A compiler translates machine code into a high-level language program.

A compiler often produces a separate object code program.


[1]

(b) Tick the most accurate statement about the use of a linker.

A linker executes a high-level program one statement at a time before translating the
next statement.
A linker takes one or more source code files and combines them into a single executable
file.
A linker takes one or more object files and combines them into a single executable file.

A linker is used in conjunction with an interpreter.


[1]

© UCLES 2017 9626/12/O/N/17


3

2 Many schools want IT departments to introduce lessons emphasising aspects of e-safety.

Tick four of the following statements which offer good advice.

It is alright to send an email to a person you do not know as it does not matter if
they find out your email address.
You should always attach a photograph of yourself to an email so they know who
you are.
You should only use websites recommended by teachers.
It is acceptable to post a photograph of your school on a social media site as so
many students go there.
You should always think twice before opening an email from an unknown person
as it might be spam.
It is okay, for the first time, to meet a person you only know from the internet on
your own.
You should know how to block and report unwanted users from social media sites.
It is acceptable, if you trust them, to give someone you have only met on the
internet your name and address.
When using instant messaging it is okay to use bad language if you are among
friends.
When playing games on the internet you should never use your real name.
[4]

© UCLES 2017 9626/12/O/N/17 [Turn over


4

3 A health inspector, Josefine, is investigating the health of students. She wishes to study the effect
on them of traffic on roads passing close to the school. One road seems to be causing more
problems than others. She is going to collect data regarding the amount of traffic and its effect on
their health.

(a) Describe, with specific reference to the investigation, how she could gather data from direct
data sources.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2017 9626/12/O/N/17


5

(b) Describe the drawbacks of gathering data from direct data sources.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

(c) Give reasons why the information that Josefine collects may be inaccurate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 9626/12/O/N/17 [Turn over


6

The school’s students have collected data about cars for a maths project. The teacher has decided
to code the data. Here is some of the data. The codes he will use are in brackets.

Male or
Approximate
Colour Make female
age of driver
driver
Light blue (B) Frod (F) Male (M) 50–59 (50)

Green (G) Olep (O) Female (F) 30–39 (30)

Dark blue (B) Vagen (V) Female (F) 20–29 (20)

(d) Give three reasons why the teacher is planning to code the data.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

(e) Give three reasons why the IT teacher has warned against some of the coding the maths
teacher plans to use.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2017 9626/12/O/N/17


7

4 Jasvinder has just become manager of the ticketing department in an airport. Part of her job is to
provide tickets for passengers who have decided to fly at the last minute. She uses computers
to produce the tickets. She also has to produce hard copy of the details of every flight, including
passenger names, prior to each flight.

Evaluate the output devices which Jasvinder might use, including their specific use in this system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/12/O/N/17 [Turn over


8

5 Below is an extract from a spreadsheet showing details of one day’s train journeys between
London and Paris. A hyphen, ‘-’, in a cell indicates that the train does not stop at that station.

I J K L M N
LONDON EBBSFLEET ASHFORD PARIS
Train No.
2 St Pancras Intl International International Gare du Nord
3 05:40 05:58 06:24 09:17 9080
4 06:18 – 06:55 09:47 9002
5 07:01 – – 10:17 9004
6 07:55 08:12 – 11:17 9008
7 08:19 08:38 – 11:47 9010
8 09:17 09:34 09:55 12:47 9014
9 10:01 – – 13:17 9016
10 10:24 10:42 – 13:47 9018
11 11:01 – – 14:17 9020
12 11:31 – – 14:47 9022
13 12:01 – – 15:17 9060
14 12:24 12:42 – 15:47 9024
15 13:31 – – 16:47 9028
16 14:01 – – 17:17 9030
17 14:31 – – 17:47 9032
18 15:31 – – 18:47 9036
19 16:01 – – 19:17 9038
20 16:22 – 16:55 19:47 9040
21
22 Number of non-stop trains 10

Michelle, the train controller in London, wants to use this spreadsheet to count the number of
trains that do not stop at any station between London and Paris.

(a) Write down the formula which should go in cell M22 to give her this information.

= ................................................................................................................................................

.............................................................................................................................................. [6]

You can use the space below for any working you need.

© UCLES 2017 9626/12/O/N/17


9

(b) Describe the steps that Michelle would need to carry out if she wanted to print out the Train
No. of the trains that do not stop at any station between London and Paris.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2017 9626/12/O/N/17 [Turn over


10

6 Below is an extract from a company’s database which shows the details of their factory workers.

Workers_Id Family_Name First_Name Department Salary


031597 Cisse Koulthum Extrusion $43,000.00
047006 Traore Adama Cold rolling $35,000.00
131654 Dia Omar Extrusion $39,000.00
235804 Kone Mame Foundry $34,500.00
239412 Diop Souleymane Foundry $32,000.00
243303 Fall Leo Hot rolling $37,500.00
471584 Contee Henry Cold rolling $36,000.00
486439 Keita Sundiata Tube production $29,000.00
500368 Gallo Jerry Extrusion $41,500.00
512759 Diallo Noumu Tube production $28,500.00

Describe the steps you would use to create a report containing the Workers_Id number and Salary
only, using the most efficient method to extract all the Hot rolling or Cold rolling workers whose
salary is greater than $35,000.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/12/O/N/17


11

7 A number of airline companies train their pilots using flight simulators.

Evaluate the use of simulation in this application.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/12/O/N/17 [Turn over


12

8 A college keeps records of its A Level students and the subjects they study in a database. It has
the following tables:

Students’ names
Students’ other personal data
Details of when they started studying the subject
All the possible subjects which can be taken by A Level students.

These tables are linked as shown below.

students_2 students_1 joined_subject 1 subjects


1 1 1
Student_ID Student_ID Student_ID Subject_code
Phone_number First_name Subject_code Subject_name
Address Last_name Date_joined Subject_description
Date_of_birth

Using examples from the tables shown above or otherwise:

(a) Describe the three relationships:

(i) one-to-one

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) one-to-many

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2017 9626/12/O/N/17


13

(iii) many-to-many

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

(b) Define ‘referential integrity’ and explain why it is so important.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 9626/12/O/N/17 [Turn over


14

9 Siegfreid has created a word processed document using ‘proprietary software’. Simon has
suggested that he should save it in an ‘open-source file format’.

(a) Describe what is meant by ‘proprietary software’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe what is meant by an ‘open-source file format’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2017 9626/12/O/N/17


15

10 Chow uses sound editing software to vary the sampling rate in an audio file.

Describe what is meant by sampling and how the sampling rate affects audio file sizes.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2017 9626/12/O/N/17 [Turn over


16

11 A space agency pays scientists whose job is to enable rockets to be sent to the moon.
Describe how batch and real-time processing would be used by the agency and its scientists.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/12/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 6 0 4 0 8 3 8 1 0 4 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (NF/AR) 133657/3
© UCLES 2017 [Turn over
2

1 Tick the four most accurate statements about relational databases.

Duplication of data is avoided saving storage space.

Every individual mistake in the database has to be manually corrected in all tables.
It is easier to produce cross-tabular reports in relational databases than with flat file
databases.
The only two possible relationships are one-to-one and many-to-one.

It is impossible to make mistakes when entering data into a relational database.

Tables can be linked using a key field.

There must be at least three tables in a relational database.

Primary keys are unnecessary whereas you must have them with flat file databases.

Relational databases cannot store as much information as flat file databases.

Referential integrity helps to prevent database users entering inconsistent data.


[4]

2 Tick the four statements referring to the use of the internet and the World Wide Web which are
true.

The internet is fully policed and safe.

Information on the World Wide Web tends to be up to date.

The World Wide Web has vast amounts of information.

All information on the World Wide Web is unbiased.

All websites are accurate.

Lack of expertise in using search engines can lead to inefficient searching.


It is more difficult to plagiarise information using the World Wide Web than copying
out of a hard copy book.
There is a danger of accessing inappropriate websites.

The internet is smaller than an intranet.

The World Wide Web and the internet are the same thing.
[4]

© UCLES 2017 9626/13/O/N/17


3

3 Ian wants to apply encryption to all his emails. He is not sure whether to use asymmetric or
symmetric encryption.

(a) Describe what is meant by the asymmetric method of encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

(b) Describe what is meant by the symmetric method of encryption.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2017 9626/13/O/N/17 [Turn over


4

4 Helen is the manager of a company which sells cars. She is going to produce a blog about the
success of the company. She will use word processing, spreadsheets, databases and other
software.

Evaluate the different types of software she will use to produce the blog.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/13/O/N/17


5

5 The digital divide can exist between different groups of people.

Describe the groups of people who are affected and explain why this is the case.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/13/O/N/17 [Turn over


6

6 Below is part of a spreadsheet Xia has created to model his personal finances.

A B
1 2600 Wages/salary
2
3 1000 Mortgage/rent
4 120 Utilities
5 50 Phone
6 100 Satellite/TV
7 80 Internet
8 550 Groceries
9 100 Clothing
10 150 Eating out
11 75 Hair/beauty
12 30 Pet food
13 40 Cinema
14 160 Car/travel
15 100 Insurance
16
17 =SUM(A3:A15) Total outgoings
18 =MAX(A3:A15) =VLOOKUP(A18,$A$3:$B$15,2,FALSE)
19
20 =A1-A17 Balance
21

(a) Identify the value which would appear in cell B18 explaining how you arrived at your answer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 9626/13/O/N/17


7

(b) Xia is not sure whether the spreadsheet would work if some of the values were changed.
Describe the test plan you would use to help Xia make sure there are no errors in his
spreadsheet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2017 9626/13/O/N/17 [Turn over


8

7 Fig. 1 below shows a small extract from a school database. All students shown are in year
groups 9, 10 or 11 depending on their year of birth. Each student’s year group, which is not part of
the database, is shown in Fig. 2.

student_ID student_name option _1 option_2 year of birth


100132 Marian Griffith Geography Art 2001
101648 Manjit Dupay Sociology Design Tech 2003
103457 Ho Chan History Spanish 2002
104895 Johan Schmidt Geography Art 2002
105456 Paul Dugarry History German 2001
105645 Li Cho History Latin 2002

Fig. 1

Name year_group
Marian Griffith 11
Manjit Dupay 9
Ho Chan 10
Johan Schmidt 10
Paul Dugarry 11
Li Cho 10

Fig. 2

The year_group field needs to be added to the database and will be a calculated field.

(a) Explain how you would set up the calculated year_group field.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]
© UCLES 2017 9626/13/O/N/17
9

(b) You have been asked to produce a well-formatted report showing the year 10 students
studying History. The report will contain a list of these students showing only each student’s
name, identity number and the total number of students involved.

Explain how you would produce such a report.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2017 9626/13/O/N/17 [Turn over


10

8 Many people complain about the number of CCTV cameras there are in public places.

Discuss the benefits and drawbacks of CCTV monitoring in public places such as on streets or
inside shops.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/13/O/N/17


11

9 Wilhelm has tried importing a word-processed file into his spreadsheet but the software gives the
error message ‘file format not valid’.

Explain why this has happened and explain what Wilhelm should do to his data to enable him to
load it into his spreadsheet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

10 Describe the characteristics which make spreadsheets suitable for modelling situations.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2017 9626/13/O/N/17 [Turn over


12

11 Ahmed was overheard saying ‘MIS is a piece of software to store data’. Anjan, his colleague, said
‘I am sure it’s a little more complicated than that.’

By describing the features of a management information system (MIS), explain why Anjan was
justified in his statement.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/13/O/N/17


13

12 Paul and his team of programmers are writing software for a new project for a large company.
Every month, Paul and the programmers report to the company directors by means of a
video-conference.

Describe how Paul would set up and run this video-conference, assuming that the necessary
equipment and software has already been purchased and tested.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/13/O/N/17 [Turn over


14

13 When an expert system is used to suggest solutions to problems the inference engine uses a form
of reasoning involving forward chaining or backward chaining.

Explain the differences between forward chaining and backward chaining by describing both
terms.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/13/O/N/17


15

BLANK PAGE

© UCLES 2017 9626/13/O/N/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/13/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 8 7 2 8 8 8 5 8 3 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NF/FC) 134530/3
© UCLES 2017 [Turn over
2

1 A company pays its workers weekly. The payroll department collects the data about the workers
and stores it in a transaction file. At the end of the week, the transaction file is used to update the
master file.

Draw a system flowchart which shows how the transaction file and master file are used to produce
the payslips for the workers.

[8]
© UCLES 2017 9626/32/O/N/17
3

2 Virtual reality and augmented reality are technologies used in medicine.

Explain the difference between virtual reality and augmented reality.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2017 9626/32/O/N/17 [Turn over


4

3 An artist has sketched some of the shapes to use in a cartoon image of a snail.

The pre-drawn shapes are shown in Fig. 1.

Shape 1 Shape 2 Shape 3 Shape 4

Fig. 1

The final image is then composed and completed using image-editing tools on a computer. It is
shown in Fig. 2.
Cartoon Snail

Fig. 2

Explain, in detail, how you would use image-editing tools to create the final image from the
components.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
© UCLES 2017 9626/32/O/N/17
5

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/32/O/N/17 [Turn over


6

4 A new online supermarket will have a very large amount of data about its customers, products and
services that has to be kept safe. Complete back-ups of all its data are to be created at regular
intervals. Jaswinder, the IT manager, is considering the options of using tape-based systems, hard
disk-based systems or back-ups to the ‘cloud’ for storing the back-ups.

Evaluate the three options for storing the back-ups.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/32/O/N/17


7

5 A software developer has decided to use a conventional ‘waterfall’ method of development to


produce a new game application.

(a) Describe the stages of the ‘waterfall’ method that should be followed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2017 9626/32/O/N/17 [Turn over


8

(b) Discuss the benefits and drawbacks to the developer of using the ‘waterfall’ method for
developing the game application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2017 9626/32/O/N/17


9

6 Audio files can be digitised with different bit rates.

The bit rate of an audio file can appear to affect the quality of the sound when it is listened to.

Explain how you can affect the perceived quality of the sound stored in the audio file by changing
the bit rate.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/32/O/N/17 [Turn over


10

7 A new operating system for smartphones has been developed and is now ready for testing to
begin.

Discuss the benefits and drawbacks of white box testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/32/O/N/17


11

8 A data protection act can contain principles that create rights for those people who have their data
stored and processed by companies.

(a) Describe the rights that could be created by a data protection act.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Data controllers are appointed by companies to safeguard the rights of individuals whose
data is stored.

Describe two criminal offences that may be committed by data controllers if they fail to abide
by the principles of a data protection act.

1 ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2017 9626/32/O/N/17 [Turn over


12

9 WiFi is often used to connect devices to the internet. In some buildings, WiFi signals may be
degraded so that data transfer appears to be ‘slow’.

Explain how you could try to ensure that the WiFi system suffers minimal signal degradation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/32/O/N/17


13

10 A new software application has been developed. A programmer has been brought in to make
further developments. This programmer will need documentation specific to her needs.

Describe, giving reasons, the elements of the documentation that she will need.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/32/O/N/17 [Turn over


14

11 A shop is open between 12 noon and 10 pm.

While the shop is closed in the morning, a message saying “Sorry, we are closed” is displayed.
After the shop has closed in the evening a message saying “Please try again tomorrow” is
displayed. At all other times, a message saying, “Hello, we are open now” is displayed.

JavaScript code can be used to alter web pages in real time.

Complete the code in the function below that will allow a user to find out if the shop is open or
closed.

function OpenTimesFunction() {
var welcome;
var timenow = new Date().getHours();

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

document.getElementById(“open”).innerHTML = welcome;
//This line displays the result of the code
}

[6]

© UCLES 2017 9626/32/O/N/17


15

12 An animator is producing a digital cartoon showing a dancer in action on a beach. She has
produced four frames of her cartoon and digitised them.

1 2 3 4

Explain how you would create the illusion of movement between frames 1 and 4.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/32/O/N/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/32/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 8 2 9 0 4 4 6 5 2 8 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 13 printed pages and 3 blank pages.

DC (NF) 134527/2
© UCLES 2017 [Turn over
2

1 A new open-source operating system for smartphones is being developed. Prototypes are being
constructed.

(a) You have helped to develop the new operating system and are now ready to test it. You have
to create a test plan.

(i) Explain the importance of having a test plan.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

© UCLES 2017 9626/33/O/N/17


3

(ii) Describe, in detail, the testing strategy that would be carried out on this open-source
operating system.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [8]

© UCLES 2017 9626/33/O/N/17 [Turn over


4

(iii) Discuss the benefits and drawbacks of the black box method of testing software.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [8]

© UCLES 2017 9626/33/O/N/17


5

2 Discuss the benefits and drawbacks of using computer-aided manufacturing (CAM) to produce
the prototype of a new tail fin for a racing car.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/33/O/N/17 [Turn over


6

3 A new computer system is to be installed by a company to replace its existing system. A systems
analyst is producing a report on the current operations of the company before the company installs
the new computer system. The analyst is interviewing the users of the existing system.

Evaluate other methods that the analyst could use to research the existing system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/33/O/N/17


7

4 A shopper has a bank account, number 65636373, with a balance of $1100. The shopper wants to
use electronic funds transfer to purchase a jacket for $159, a video recorder for $699 and a digital
camera for $300 from different stores in a retail park. A bank card is used by the customer at the
electronic funds transfer point of sale terminal in each store. The card is scanned and the PIN
entered and accepted.

Describe, in detail, the processes involved in the electronic funds transfer for these purchases.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/33/O/N/17 [Turn over


8

5 A small database is being developed for an online book store that only sells books to people
over 21 years of age. The database is to contain a table with the details of customers of the
store. The store wishes to hold details of the customers’ names, titles, email addresses and postal
addresses. It also requires a home telephone number for every customer.

In the space below, create a suitable data dictionary for use when developing the table for the
database.

[8]

© UCLES 2017 9626/33/O/N/17


9

6 Information technology (IT) has changed the way that people both observe and take part in sports.

Describe how IT has changed the sports experience for people.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

7 A home network uses a router to connect to the internet.

(a) The router will act as a ‘default gateway’.

Define ‘default gateway’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2017 9626/33/O/N/17 [Turn over


10

(b) The router uses wireless technology to allow devices in the home to connect to it.

Discuss the benefits and drawbacks of using wireless technology to connect devices to the
router.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2017 9626/33/O/N/17


11

8 The tasks, and the time allowed for each task, for the building of a new house are shown in the
table below.

Task ID Task Duration (days)


A lay the foundations 3
B build the external walls 4
C put on roof 7
D install external doors and windows 2
E make doors and windows 5
F install utilities 6
G paint interior 5
H install interior walls 3
I install interior doors 2
J finish exterior 4

These tasks must be carried out in this order: A, B, C, D, H, I and J.


Task E can be carried out at the same time as Tasks A, B and C but must be carried out before
Task D.
Task F must be carried out after task C and before task I but can be done at the same time as
tasks D and H.
Task G must be done after tasks F, H and I but can be done at the same time as task J.

(a) Draw an activity network diagram for building the new house.

[8]

© UCLES 2017 9626/33/O/N/17 [Turn over


12

(b) Use your activity network diagram to calculate the critical path through the tasks.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

9 Project management involves decision-making.

Describe how you would use software tools to assist in decision-making.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2017 9626/33/O/N/17


13

10 Computers can be used to edit images for advertising features in a printed magazine.

Describe the use of image editing techniques to alter images for use in advertising products.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/33/O/N/17


14

BLANK PAGE

© UCLES 2017 9626/33/O/N/17


15

BLANK PAGE

© UCLES 2017 9626/33/O/N/17


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/33/O/N/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 7 1 6 8 6 6 4 3 9 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2017
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (KN) 146864
© UCLES 2017 [Turn over
2

1 (a) Tick the most accurate statement about the use of a compiler.

A compiler executes a high-level program one statement at a time before translating the
next statement.
A compiler converts object code into source code.

A compiler translates machine code into a high-level language program.

A compiler often produces a separate object code program.


[1]

(b) Tick the most accurate statement about the use of a linker.

A linker executes a high-level program one statement at a time before translating the
next statement.
A linker takes one or more source code files and combines them into a single executable
file.
A linker takes one or more object files and combines them into a single executable file.

A linker is used in conjunction with an interpreter.


[1]

© UCLES 2017 9626/11/O/N/17


3

2 Many schools want IT departments to introduce lessons emphasising aspects of e-safety.

Tick four of the following statements which offer good advice.

It is alright to send an email to a person you do not know as it does not matter if
they find out your email address.
You should always attach a photograph of yourself to an email so they know who
you are.
You should only use websites recommended by teachers.
It is acceptable to post a photograph of your school on a social media site as so
many students go there.
You should always think twice before opening an email from an unknown person
as it might be spam.
It is okay, for the first time, to meet a person you only know from the internet on
your own.
You should know how to block and report unwanted users from social media sites.
It is acceptable, if you trust them, to give someone you have only met on the
internet your name and address.
When using instant messaging it is okay to use bad language if you are among
friends.
When playing games on the internet you should never use your real name.
[4]

© UCLES 2017 9626/11/O/N/17 [Turn over


4

3 A health inspector, Josefine, is investigating the health of students. She wishes to study the effect
on them of traffic on roads passing close to the school. One road seems to be causing more
problems than others. She is going to collect data regarding the amount of traffic and its effect on
their health.

(a) Describe, with specific reference to the investigation, how she could gather data from direct
data sources.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2017 9626/11/O/N/17


5

(b) Describe the drawbacks of gathering data from direct data sources.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

(c) Give reasons why the information that Josefine collects may be inaccurate.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 9626/11/O/N/17 [Turn over


6

The school’s students have collected data about cars for a maths project. The teacher has decided
to code the data. Here is some of the data. The codes he will use are in brackets.

Male or
Approximate
Colour Make female
age of driver
driver
Light blue (B) Frod (F) Male (M) 50–59 (50)

Green (G) Olep (O) Female (F) 30–39 (30)

Dark blue (B) Vagen (V) Female (F) 20–29 (20)

(d) Give three reasons why the teacher is planning to code the data.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

(e) Give three reasons why the IT teacher has warned against some of the coding the maths
teacher plans to use.

1 ...............................................................................................................................................

...................................................................................................................................................

2 ...............................................................................................................................................

...................................................................................................................................................

3 ...............................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2017 9626/11/O/N/17


7

4 Jasvinder has just become manager of the ticketing department in an airport. Part of her job is to
provide tickets for passengers who have decided to fly at the last minute. She uses computers
to produce the tickets. She also has to produce hard copy of the details of every flight, including
passenger names, prior to each flight.

Evaluate the output devices which Jasvinder might use, including their specific use in this system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/11/O/N/17 [Turn over


8

5 Below is an extract from a spreadsheet showing details of one day’s train journeys between
London and Paris. A hyphen, ‘-’, in a cell indicates that the train does not stop at that station.

I J K L M N
LONDON EBBSFLEET ASHFORD PARIS
Train No.
2 St Pancras Intl International International Gare du Nord
3 05:40 05:58 06:24 09:17 9080
4 06:18 – 06:55 09:47 9002
5 07:01 – – 10:17 9004
6 07:55 08:12 – 11:17 9008
7 08:19 08:38 – 11:47 9010
8 09:17 09:34 09:55 12:47 9014
9 10:01 – – 13:17 9016
10 10:24 10:42 – 13:47 9018
11 11:01 – – 14:17 9020
12 11:31 – – 14:47 9022
13 12:01 – – 15:17 9060
14 12:24 12:42 – 15:47 9024
15 13:31 – – 16:47 9028
16 14:01 – – 17:17 9030
17 14:31 – – 17:47 9032
18 15:31 – – 18:47 9036
19 16:01 – – 19:17 9038
20 16:22 – 16:55 19:47 9040
21
22 Number of non-stop trains 10

Michelle, the train controller in London, wants to use this spreadsheet to count the number of
trains that do not stop at any station between London and Paris.

(a) Write down the formula which should go in cell M22 to give her this information.

= ................................................................................................................................................

.............................................................................................................................................. [6]

You can use the space below for any working you need.

© UCLES 2017 9626/11/O/N/17


9

(b) Describe the steps that Michelle would need to carry out if she wanted to print out the Train
No. of the trains that do not stop at any station between London and Paris.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2017 9626/11/O/N/17 [Turn over


10

6 Below is an extract from a company’s database which shows the details of their factory workers.

Workers_Id Family_Name First_Name Department Salary


031597 Cisse Koulthum Extrusion $43,000.00
047006 Traore Adama Cold rolling $35,000.00
131654 Dia Omar Extrusion $39,000.00
235804 Kone Mame Foundry $34,500.00
239412 Diop Souleymane Foundry $32,000.00
243303 Fall Leo Hot rolling $37,500.00
471584 Contee Henry Cold rolling $36,000.00
486439 Keita Sundiata Tube production $29,000.00
500368 Gallo Jerry Extrusion $41,500.00
512759 Diallo Noumu Tube production $28,500.00

Describe the steps you would use to create a report containing the Workers_Id number and Salary
only, using the most efficient method to extract all the Hot rolling or Cold rolling workers whose
salary is greater than $35,000.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2017 9626/11/O/N/17


11

7 A number of airline companies train their pilots using flight simulators.

Evaluate the use of simulation in this application.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2017 9626/11/O/N/17 [Turn over


12

8 A college keeps records of its A Level students and the subjects they study in a database. It has
the following tables:

Students’ names
Students’ other personal data
Details of when they started studying the subject
All the possible subjects which can be taken by A Level students.

These tables are linked as shown below.

students_2 students_1 joined_subject 1 subjects


1 1 1
Student_ID Student_ID Student_ID Subject_code
Phone_number First_name Subject_code Subject_name
Address Last_name Date_joined Subject_description
Date_of_birth

Using examples from the tables shown above or otherwise:

(a) Describe the three relationships:

(i) one-to-one

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) one-to-many

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2017 9626/11/O/N/17


13

(iii) many-to-many

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [4]

(b) Define ‘referential integrity’ and explain why it is so important.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2017 9626/11/O/N/17 [Turn over


14

9 Siegfreid has created a word processed document using ‘proprietary software’. Simon has
suggested that he should save it in an ‘open-source file format’.

(a) Describe what is meant by ‘proprietary software’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe what is meant by an ‘open-source file format’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2017 9626/11/O/N/17


15

10 Chow uses sound editing software to vary the sampling rate in an audio file.

Describe what is meant by sampling and how the sampling rate affects audio file sizes.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2017 9626/11/O/N/17 [Turn over


16

11 A space agency pays scientists whose job is to enable rockets to be sent to the moon.
Describe how batch and real-time processing would be used by the agency and its scientists.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2017 9626/11/O/N/17


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1 Duplication of data is avoided saving storage space. 3 4

Every individual mistake in the database has to be manually corrected


in all tables.
It is easier to produce cross tabular-reports in relational databases
3
than with flat file databases.
The only two possible relationships are one-to-one and many-to-one.
It is impossible to make mistakes when entering data into a relational
database.
Tables can be linked using a key field. 3
There must be at least three tables in a relational database.
Primary keys are unnecessary whereas you must have them with flat
file databases.
Relational databases cannot store as much information as flat file
databases.
Referential integrity helps to prevent database users entering
3
inconsistent data.

Question Answer Marks

2 4
The internet is fully policed and safe.

Information on the world wide web tends to be up to date. 3

The world wide web has vast amounts of information. 3

All information on the world wide web is unbiased.

All websites are accurate.

Lack of expertise in using search engines can lead to inefficient


3
searching.
It is more difficult to plagiarise information using the world wide web
than copying out of a hard copy book.

There is a danger of accessing inappropriate websites. 3

The internet is smaller than an intranet.

The world wide web and the internet are the same thing.

© UCLES 2017 Page 2 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(a) Five from: 5

Asymmetric encryption is often referred to as public key encryption


The public key is used to encrypt the data«
«the corresponding private/secret key is used to decrypt the data
The public key is published to everyone«
«but the private key is kept secret
Anyone with a copy of the public key can encrypt information«
«but only the private key holder can read it
It is not possible to deduce the private key from the public key.

3(b) Three from: 3

Symmetric encryption only uses a single private/secret key


This private/secret key must be shared and kept private by both the sender
and the receiver
This private/secret key is used for both encryption and decryption
To use symmetric encryption sender and receiver must securely share a key
before sending/receiving a message.

© UCLES 2017 Page 3 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 This question to be marked as levels of response: 8

Level 3 7–8 marks


Candidates will explain both the advantages and disadvantages of a range of
different types of software using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a structured
and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 4–6 marks


Candidates will explain the advantages and disadvantages of more than one
type of software.
Examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a structured
and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 1–3 marks


Candidates may only give basic advantages/disadvantages of one type of
software.
Answers may be simplistic with little or no relevance.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 0 marks
Response with no valid content.

Answers may include:

Using word processing it is easier to edit documents ready for inclusion in the
website compared to text editors, spreadsheets and databases
Using word processing it is easier to format documents ready for inclusion in
the website compared to text editors, spreadsheets and databases
Using word processing it is more difficult to enter statistics and manipulate
these compared to spreadsheets and databases
Easier to calculate statistics with a spreadsheet than using database software
Can produce charts to show sales growth with a spreadsheet easier than using
a database
Databases could be used to store and process sales figures easier than a
spreadsheet
Easier to query a database than using a spreadsheet
Easier to produce reports with a database than a spreadsheet
With a text editor formatting is not lost when converting to HTML
Using web authoring package is easier to produce a blog than using text
editor«
«easier to use than text editor as functions are provided.

© UCLES 2017 Page 4 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5 Six from: 6

The digital divide can exist between those living in rural areas and those living
in urban areas
There may be a lack of/expensive to install infrastructure in rural areas
The quality of connection to the internet may be poor in rural areas
The digital divide can exist between people from different economic
classes/rich and poor
The poor cannot afford to buy computers/hardware/software/equipment
Poor cannot afford the education/training needed to learn about the new
technology
Lower-income and minority groups are buying smartphones but there are rising
costs of data plans
Disabilities of potential internet users constitute another type of divide
Users with poor hand coordination will not be able to manipulate
keyboards/input devices
The digital divide can exist between the educated and uneducated
The less well educated may not have the skills, knowledge and abilities to use
the technologies
The digital divide can exist between old and young people
Young people have grown up with the technology/older people may
feel they are too old/unwilling to learn about new technology/do not know
how to use it
The digital divide can exist between developed and developing countries
The quality of connection to the internet may be poor in developing countries
The price of connection to the internet may be high in developing countries
In some less well developed countries the population has limited access to
digital services.

Question Answer Marks

6(a) 4
The value in B18 would be Mortgage/rent
The value in A18 would be the maximum value in A3:A15 which is 1000
The lookup function would search the range A3:B15 to find 1000
It returns the value in the same row but in column 2.

© UCLES 2017 Page 5 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6(b) Eight from: 8

A table with columns for Test, Test data, Actual result, Expected result and
comments on comparison of actual result – 2 marks (1 for at least 3
appropriate headings and 2 for 5 appropriate headings)
Test the SUM function by changing some values in A3:A15
Test the MAX function by changing some values in A3:A15
Calculate the expected results for SUM using a calculator, MAX using sight
Test the VLOOKUP function by changing values in B3:B15 and some values in
A3:A15
Look through the data to find what should be in the LOOKUP cell
To test the A1-A17 formula change the value in A1 and some of the values in
A3:A17
Calculate the expected results for =A1-A17 using a calculator
Run each test
Make a note saying whether there are any differences between actual results
and expected results.

Question Answer Marks

7(a) Six from: 6

Open the database


Create a query
In query design view in the field row of the grid
Type in year_group:
2012
– [year_of_birth]
Save the query
Run the query.

7(b) Eight from: 8

Create a query based on the previous query (part (a))


Select the fields student_ID, student_name, option_1 and year_group
Deselect option_1 and year_group fields for showing
In the criteria box under year_group, type 10
In the criteria box under option_1, type “History”
Run the query and save it
Create the report from this query
The number of students will appear in the footer
In the report section, format the report.

© UCLES 2017 Page 6 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8 Eight from: 8

Benefits:
If CCTV cameras constantly monitor a retail business, criminals will likely seek
an easier target/may not commit the crime
If employees know that they are constantly being watched, they are less likely
to steal from their employer or waste time on the job
If a crime occurs in an establishment that has installed CCTV surveillance,
investigation will be aided by the recorded video/can be used as evidence in
court cases
If an argument occurs between two employees, the employer can examine the
videotape to determine what actually occurred
CCTV can help settle disputes when a customer has a complaint cameras are
effective in apportioning blame

Drawbacks:
CCTV is usually not able to display every bit of an area
Some people object to the invasion of privacy due to constant video monitoring
Employees under constant surveillance by CCTV cameras often dislike
monitoring of their daily behaviour
The cameras can sometimes be thwarted by covering them up
Someone who is familiar with the property may still be able to avoid being
caught on camera
Hackers can get into the system and control which ways the cameras are
pointing while their comrades in crime do the crime.

Must have no more than 6 from each section.


One mark is available for a reasoned conclusion.

Question Answer Marks

9 Four from: 4

Word processing files are a word processing file type


Spreadsheets are a different file type and do not recognise word processing
file types
To overcome this Wilhelm should convert his word processing file to a generic
file format
He could save his word processed file as a .csv file or a .txt file
He will then be able to open his spreadsheet software and open the file.

© UCLES 2017 Page 7 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

10 Four from: 4

Absolute and relative cell referencing makes sure you only increment the parts
of a formula you need to
Cell protection makes sure that the cells you want do not change by accident
User interface forms makes it easier to input values into the model
Macros make it easier to create more complex formulae or functions
Automatic re-calculation means it is not necessary to evaluate a formula every
time you change it
Conditional formatting allows you to highlight certain values that match specific
criteria
Graphs/charts to detect trends.

Question Answer Marks

11 Six from: 6

MIS is a computer-based system that provides managers with the tools to


organise, evaluate and efficiently manage departments within an organisation
It provides past, present and prediction information
It includes software that helps in decision making
It includes many data resources such as databases
It includes the hardware resources of a system
It includes decision support systems, people management and project
management applications
Companies are able to identify their strengths and weaknesses due to the
presence of revenue reports, employees’.

Question Answer Marks

12 Six from: 6

Agree a date and time


Send a reminder/invitation to the participants shortly before start«.
«. including access to password/PIN
Adjust webcam so they can be seen
Create and enter virtual room(s)/environment
Load/examine/share documents using appropriate software
Uploads any necessary documents for the meeting
Sends a link to the website
Enter his user name and password
Using the software select participants
Select appropriate meeting space/room
Select those participants who can enter the room
Limit the participation of participants/mute volume/disable
messaging/disable cameras
Communicate by speaking into a microphone and looking at the webcam.

© UCLES 2017 Page 8 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

13 Six from: 6

Forward chaining starts with the available data and uses inference rules to
extract more data...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until it
finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘THEN’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Backward chaining starts with a list of goals/hypotheses and works backwards
An inference engine using backward chaining would search the inference rules
until it finds one which has a THEN part that matches a desired goal
If the IF part of that rule is not known to be true, then it is added to the list of
goals
Because the list of goals determines which rules are selected and used, this
method is called goal-driven«
«in contrast to data-driven forward-chaining.

© UCLES 2017 Page 9 of 9


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory October/November 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2017 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1 8

Question Answer Marks

2 Four from: 4

Augmented reality is computer-generated supplement to real world


«in real time
...reality is modified by/overlaid with artificial information
...used to e.g. project remote surgeons hands into real operation
...used to show (by means of handheld scanner) nurses/doctors
Where arteries and veins are in body
...used to allow users/students to manipulate a skeletal model
Which has augmented reality targets attached
Virtual reality is computer-generated replacement of real world
...simulates physical presence in a real/virtual world
...used in ‘exposure therapy’ e.g. to overcome fears such as flying.

© UCLES 2017 Page 2 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3 Eight from: 8

Create new canvas/image on which to compose the final image of the snail
Copy and paste/scan all components into the new canvas so that they are
ready for editing
Ensure that all backgrounds of all shapes are set to transparent to allow
overlap of components
Shape 1 has part of the image cut out/erased to produce the eye shape
Shape 1 is copied and pasted to produce two images for the eyes of the snail
Shape 2 is inverted/flipped horizontally (across the vertical plane) and resized
larger/enlarged for the shell
Shape 3 is rotated by 90 degrees and inverted horizontally to form one of the
antennae
...resulting shape is copied and pasted and stretched horizontally to form the
second antenna
Shape 4 is resized, filled with black to form the body of the snail
All the shapes are positioned/aligned together/grouped to form the composite
cartoon snail
Brush tool with pencil/small size is used to ensure that the join between
shape 2/shell and shape 3/body is complete/no gaps are left
...used to add dotted line at base of shell/shape 2
Text is added and rotated left by 90/right by 270 degrees
...text is positioned as shown
Components are grouped and resized together to form final image.

© UCLES 2017 Page 3 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 Answers/Indicative content Level of Response 8

This question to be marked as a Level 3 (7–8 marks)


Level of Response.
Candidates will evaluate in detail the
Evaluation requires that advantages options for creating backups.
and disadvantages be discussed The information will be relevant,
and weighed up in importance. clear, organised and presented in a
structured and coherent format.
Answers may make reference to There will be a reasoned
e.g.: conclusion/opinion.
Subject specific terminology will be
Tape-based: used accurately and appropriately.
established technology
• huge storage capacity Level 2 (4–6 marks)
• serial access
• cheap per GByte Candidates will evaluate the options
• can be slow to create backup for creating backups.
• can be slow to recover files For the most part, the information
• tapes can be fragile will be relevant and presented in a
• tapes may not work in different structured and coherent format.
tape drives. There may be a reasoned
conclusion/opinion.
Hard disk-based: Subject specific terminology will be
used appropriately and for the most
• quick to produce backup
part correctly.
• quick to recover files
• direct access Level 1 (1–3 marks)
• cost per GByte varies/can be
expensive Candidates will describe the options
• large capacities for creating backups.
• hard disk can fail losing large Answers may be in the form of a list.
amounts of data. There will be little or no use of
specialist terms.
‘Cloud’-based:
• off-site technology used so not Level 0 (0 marks)
so vulnerable to on-site
disasters Response with no valid content.
• hardware/maintenance/service
costs borne by supplier
• security arranged by supplier
• security of data issues
• unlimited capacity available
• reliable internet connection
required
• high bandwidth connection
preferred.

© UCLES 2017 Page 4 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5(a) Six from: 6

Waterfall/traditional is a linear approach to software development


Determine the software/system/game requirements
...produce a requirements document for the game application
Analyse the requirements
...produce a model/overview of what is required for the game application
Design the software
...produce e.g. system flowchart/DFD for the game application
Create the code
...program, document and test the code
...unit test the source code/modules for the game application
...integrate the units/modules into the whole system/game
Carry out whole system testing of the game application
remedy any errors/bugs found
...revisit any code with improvements/alterations as a result of testing
Carry out user acceptance testing (UAT) install
...remedy any issues discovered
Develop support mechanisms for users of the game application
Deliver/implement the finished product.

5(b) Eight from: 8

Benefits:
Problems can be found and fixed early in the processes
Emphasis on full documentation (requirements documents, design
documents) means that individual team members can be replaced/no team
member is irreplaceable/new teams can complete/carry on the work
Enforces a structured approach through separate/discrete stages...
...stages easy to understand
...provides identifiable milestones

Drawbacks:
Requirements not fully known before working software created
...clients may change their requirements
...requirements may not cover all details
...clients may not know exactly what they want/all the details required
...leading to increased costs due to redesign/redevelopment/retesting
Designers may be unaware of future difficulties of designing a new software
product/feature.

Max 6 marks for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion.

© UCLES 2017 Page 5 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6 Six from: 6

Audio quality improves with increasing bit rate


...two examples from:
...800 bit/s is minimum for speech to be recognised
32 kbit/s – generally acceptable only for speech
96 kbit/s – generally used for speech/low-quality streaming
128 or 160 kbit/s – mid-range bit rate quality
192 kbit/s – a commonly used high-quality bit rate
320 kbit/s – highest bit rate level supported by the MP3 standard
...lossy compression to reduce bit rate can introduce artefacts
...caused by data/quantisation errors
...distortion of sound
...perceived/heard as ‘bubbling/burbling’
...stuttering/jerky/blanks/silences in sound.

Question Answer Marks

7 Eight from: 8

Benefits:
Allows tester to look inside system (‘introspection’)
...can identify system objects in code
...can reduce the failure rate of test code provided object names do not
change
Can be more stable/allow re-use of test code provided object names do not
change
More thorough/complete testing of code
...all aspects of code are tested
...every interaction in code/objects is tested
...all routes through code are tested

Drawbacks:
White box testing must be closely integrated with the system
...must be installed in the system to be tested
...cannot be sure that the testing is not causing the errors/problems it flags up
...cannot be sure that all platforms support the white box testing system
changes to objects/code of system may cause white box testing to fail
...white box testing code is highly integrated with system code
...requires high degree of script maintenance
Tester must have in-depth knowledge of system
...be highly skilled programmer.

Max 6 marks for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion.

© UCLES 2017 Page 6 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8(a) Four from: 4

(Derived from section 7, sixth principle of Act:


‘personal data shall be processed in accordance with the rights of data
subjects under this Act’:)

A right of access to a copy of the information held in their personal data


...told whether personal data is being processed
...given a description of personal data
...given reason(s) for processing
...given details of source of data
A right to object to processing that is likely to cause/is causing
damage/distress
A right to prevent processing for direct marketing
A right to object to decisions being taken by automated means
A right (in certain circumstances) to have inaccurate personal data rectified,
blocked, erased or destroyed
A right to claim compensation for damages caused by a breach of the Act.

8(b) Two from: 2

Failure to register when required


...and to keep personal data if not registered
...failure to provide accurate information/providing false information when
registering
Failure to comply with provisions/stick to reasons for storing data supplied
when registering
Processing data if not registered
To fail to provide Data Commissioner with updated address
failure to comply with enforcement order
...prohibition notice e.g. not to send data overseas/supply data to third party
...information notice e.g. supplying false information/not all of information
when ordered to do so.

© UCLES 2017 Page 7 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

9 Eight from: 8

Other devices can cause interference


...remove other devices e.g. microwave ovens/cordless telephones on same
frequency which can interfere with signal
...WiFi uses 2.4Ghz and/or 5GHz frequency
Ensure that access points do not use same frequencies/channels...
...other access points may use same WiFi channel and interfere with user’s
channel
Restrict use of e.g. Bluetooth®
...Bluetooth® signals can cause interference
Restrict use of mobile phones...
...mobile telephone systems can cause interference
Adjust wireless access point settings...
...wireless access point rate control set too high
...results in many retries
Wireless devices can only send or receive but not both at the same time
...effectively cuts the bandwidth in half
give devices with already established connections higher priority
...e.g. video streaming
...other devices appear to have slower access times/data transfer rates
Radio waves are slowed/blocked/’bent’ by objects
...walls/insulation/metal objects may degrade/block WiFi signals so use
materials that are transparent to wireless signals
Restrict choice of channels...
...automated channel choice can cause ‘channel hopping’
...too many changes slows access times
Restrict use of ‘legacy’ bands for WiFi
...routers are slower if they have to broadcast on several bands
simultaneously
Set access point antennas to optimum position/orientation
...may be set too low/wrong angle/hidden.

Question Answer Marks

10 Six from: 6

Technical documentation for programmer is needed


Program listing so she can see full details of the code
List of variables to follow the parameters as they are used
Program flowchart to see an overview of the program
Notes for future programmers so she knows where to start
Test plans and the results so these can be checked
Known errors/bugs so she can/attempt to correct these
Purpose of the software including reasons for choosing pieces of existing
software instead of the programmer having to write new code
Input and output data formats so she can write code to match.

© UCLES 2017 Page 8 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

11(b) Six from: 6

An example code is:

if (timenow <12) {
welcome = ‘Sorry, we are closed’;
} else if (timenow < 22) {
welcome = ‘Hello, we are open now’;
} else {
welcome = ‘Please try again tomorrow’;
}

1 mark per correct line.

Question Answer Marks

12 Eight from: 8

Using the four frames as key frames


...filling in of frames between frames 1, 2, 3 and 4
...using variable frame frequency depending on content
...fewer frames between frames 1 and 2 than e.g. between 2 and 3
...as background is stationary then lower frame rate than foreground
characters
May be low frame rate so makes motion jerky/unrealistic
Need to add at least 8 frames in order to create smooth movement
Need to add enough frames so that frame rate is below ‘flicker fusion’
threshold«
...else movement will appear to flicker and illusion of movement is destroyed
Motion blurring of the figures between frames 1 and 2 etc. can simulate faster
movement.

© UCLES 2017 Page 9 of 9


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 13 printed pages.

© UCLES 2017 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a)(i) Four from: 4

Provides overview of all the testing


...systematic outline of all features/functionality
...continuously checked/updated to reflect risks
To prepare/ensure that all aspects of running a test are considered
To train those who need to assist with the test/communicate testing regime
Provides a mechanism for outlining test needs
...lists limitations
...lists reasons for testing so testing can be effective
Ensures that legal issues/regulations are met
...to show regulatory bodies that testing has been carried out/is effective.

1(a)(ii) Eight from: 8

Ensure that the writer of the test plan knows details of work to be taken/is
competent in field of activity to be able to:
...define the aspects of the OS to be tested e.g. interface/devices that it will
run on
...define test methods/how each part is to be tested/which aspects of
smartphone is to be tested
...test OS use of smartphone facilities to ensure functionality
...assign tasks and responsibilities for testing the smartphone features
Test functionality of apps on the smartphone with new OS
Write a specific app to test specific features of smartphone with OS
Test OS with third party apps
Test ability to multi-task with apps from third parties/internal apps
...check regulations/legal issues
Test that the amount of smartphone memory is sufficient to hold/run the OS.

© UCLES 2017 Page 2 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a)(iii) Eight from e.g. 8

Benefits:
Easy to use as testers do not need to know the inner workings of product
...tester need not know programming languages/how the software has been
implemented
...can work through application as would a user
Test case can be developed quicker than for white box testing
...testers need only look at GUI
...do not need to discover all the internal paths/routes through software
....tests are done from point of view of a user
...can expose discrepancies in specification
Tests can be conducted by independent personnel from the developers
allowing for an objective perspective
....ensures the avoidance of developer-bias
Test cases can be designed as soon as specification are complete

Drawbacks:
Test cases will be difficult to design as there is no clear test specification
Script maintenance may be difficult
...if the user interface is changing during development/changes due to
testing
Scripts may not work/be fragile when testing
....GUI may not be the same for different tests
....GUI rendering may change during development
Does not test all internal pathways/all routes through software
...does not fully test the software
...many program paths will be left untested.

Max 6 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion.

© UCLES 2017 Page 3 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

2 Eight from e.g.: 8

Benefits:
High/consistent accuracy in large scale production/consistent results during
production
Production can be faster than traditional methods
Can produce complex products faster/easier than traditional methods
CAD can produce the instructions and send to CAM electronically obviating
need for manual programming
JIT can be used in conjunction with CAM

Drawbacks:
Can be slow for one off products
Need a separate CAM machine for each product
Software is expensive to develop/maintain
Expensive to train users to use the system
Errors can affect the whole production.

Max 6 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion.

© UCLES 2017 Page 4 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3 Answers/Indicative content 8
Evaluation requires that advantages and disadvantages be discussed and
weighed up in importance.

Answers may make reference to e.g.:


Document analysis:
• less time consuming than other methods/more efficient as it
requires data selection rather than data collection
• many documents are readily available/in public domain
• documents unaffected by research process
• documents are stable/do not change due to observer’s presence
• documents can be more exact/precise
• documents provide wide/broad coverage of topics

• documents may lack detail as not produced for research


• documents may be difficult to retrieve/locate
• documents may be incomplete

Questionnaires:
• relatively inexpensive to administer when large numbers are
involved
• reduced researcher bias
• questionnaires are familiar to participants
• data can be collected in a format that is easy to analyse

• participants may not complete questionnaires/return the


questionnaires fully/properly leading to incomplete data
• questions may not mean the same to all participants
• may be unclear who has completed the questionnaires
• unable to develop the questioning further
• questionnaires can be difficult to formulate

Observation:
• can collect data where/when activity occurs
• can be unobtrusive
• can provide ‘behind the scenes’ information/can directly see the
activities
• can be susceptible to observer bias
• observed often perform better when watched
• cannot help understand why people behave as they do/do what
they do

© UCLES 2017 Page 5 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3 This question to be marked as a Level of Response.

Level 3 7–8 marks


Candidates will evaluate in detail use of at least two of document analysis,
questionnaires, and observation for this research.
There will be a reasoned conclusion/opinion.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Subject specific terminology will be used accurately and appropriately.

Level 2 4–6 marks


Candidates will evaluate the use of at least two of document analysis,
questionnaires, and observation for this research.
There may be a reasoned conclusion/opinion.
For the most part, the information will be relevant and presented in a
structured and coherent format.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 1–3 marks


Candidates will describe use of document analysis, questionnaires, or
observation for this research.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 0 marks
Response with no valid content.

© UCLES 2017 Page 6 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 Eight from: 8

Bank computer uses the account number #65636373 to access the


customer record
....sees that the balance is $1100 which is greater than $159...
....bank computer sends a message confirming that there are sufficient
funds for the first purchase
Retailer confirms the purchase and an EFT message is sent to the bank to
transfer $159 from customer account to retailer account...
...$159 is subtracted from customer account
«added to retailer account...
...leaving $941 in customer account
Card reader prints receipt showing details of goods including $159 which is
handed to the customer

(Bank computer uses the account number #65636373 to access the


customer record )
....sees that the balance is $941 which is greater than $699...
...$699 is deducted from customer account
«added to second retailer account
...leaving $242 in customer account

(Bank computer uses the account number #65636373 to access the


customer record )
Account now has insufficient funds to meet the $300 request by the retail
store’s system
...returns a message saying’ insufficient funds’ for the purchase
...the $300 purchase is declined and a printout of the ‘declined transaction’
notice is printed and given to the customer.

© UCLES 2017 Page 7 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5 A suitable data dictionary would contain the following e.g.: 8

Field name Data type Field size Other


appropriate
information
Customer_ID Autonumber/ 8/as Use as Primary
Number/Text appropriate Key field

Title Text 4 Lookup: Mr, Mrs,


Ms, other
Family_name Text 15
First_name Text 15
Email_address Text 25 Validated by
picture/format
rules
Postal_address_line 1 Text 10
Postal_address_line 1 Text 10
Postal_address_line 1 Text 10
Postal/ZIP code Text 10 Validated by
picture/format
rules
Country Text 10 Validated by
picture/format
rules
Telephone Text 12 Validated by
presence check
Date_of_birth Date Automatic Validated by
picture/format
rules
Over_21 Boolean Automatic Formula: Value
derived by
checking date of
birth is over 21
years ago

© UCLES 2017 Page 8 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5 Eight from:

Customer_ID included 1 mark


All correct/suitable field names for name/family name/title/email
address/postal address/date_of_birth 1 mark
No spaces in field names 1 mark
Postal address split into lines/postal/ZIP code 1 mark
Customer_ID used a key field 1 mark
Appropriate data types for Customer_ID and Date_of_birth 1 mark
Over_21 as Boolean data type 1 mark
Appropriate field lengths for all fields given 1 mark
Lookup used for title 1 mark
Email address/Postal (ZIP) code/DoB validated by picture/format rules
1 mark
Over_21 derived by formula from DoB field 1 mark

© UCLES 2017 Page 9 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

6 Six from e.g.: 6

Used in design of equipment improved performance of items e.g. running


shoes
Used in high definition scoreboards/video screen
...updated in real-time
...can show action on field for better viewing of game
Can analyse performance/practice with view in 3D
...more detailed results/analysis available
...overlays of action for analysis
...record performance data with use of wireless devices attached to
participants
Virtual reality sports/sports online gaming
...more people can take part
More accurate scoring
« due to cameras to record issues and help judges.

Question Answer Marks

7(a) Two from e.g.: 2

Default means that this gateway/address is used unless another address is


specified
Router/computer node that has details of where to forward data packets
....if no route known already
Device that passes traffic from local subnet to devices on other subnet

© UCLES 2017 Page 10 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7(b) Eight from e.g.: 8

Benefits:
Devices are easier to move around as no wires needed...
...no need to physically connect
...no trailing wires to trip over
Greater productivity by home-workers as they can carry laptop/device with
them while doing other tasks
Ease of expansion with new devices as single access point required
...devices can be added without need to add cables/space for
connection/additional hubs/switches
...no need to drill holes/damage house fittings/walls for cables
Less expensive than wired connections so no cost of new
hubs/switches/sockets/wires

Drawbacks:
Security issues so encryption required which may be difficult to set up
Range issues as it is restricted to only 10s of metres from access point
....physical objects may interfere with signal
....reduced signal strength as distances from access point increases
Reliability issues
...subject to interference from other wireless devices/electrical items
Speed issues as rate of data transfer is lower than for cabled connections
...may vary during a session leading to poor user experience.

Max 6 for all benefits or all drawbacks.


1 mark is available for a reasoned conclusion.

© UCLES 2017 Page 11 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8(a) A suitable activity network diagram would be e.g.: 8

Eight from:

A, B, C D, H, I and J shown in correct sequence 1 mark


E shown running parallel to A, B, C and D 1 mark
F starting at/after C 1 mark
F ending before/going to I 1 mark
F shown in parallel to D and H 1 mark
G shown starting after/from I 1 mark
G shown in parallel to J 1 mark
All correct arrows 1 mark
START and FINISH points shown 1 mark

8(b) Four from: 4

Route 1 A+B+C+D+H+I+J is 3+4+7+2+3+2+4 = 25


Route 2 E+D+H+I+J is 5+2+3+2+4 = 16
Route 3 E+D+H+I+G is 5+2+3+2+5 = 17
Route 4 A+B+C+F+I+J is 3+4+7+6+2+4 = 26
Route 5 A+B+C+F+I+G is 3+4+7+6+2+5 = 27

The critical path is A to B to C to F to I to G at 27 days.

Question Answer Marks

9 Four from: 4

Use options to sort/rank/choose between alternative choices


Allows collaborative working/shared documents to reach decisions in a team
Use of visual/graphics to present choices
Use of IF-THEN/truth tables/‘fuzzy’ logic to deal with ‘partial’ truths
Use of ‘uncertainty’ analysis/‘sensitivity’ analysis for assigning
Use of mind-mapping software to show decision-trees.

© UCLES 2017 Page 12 of 13


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

10 Six from e.g.: 6

Cropping of images to remove unwanted areas...


...use of rule of thirds to keep image visual balance
...can lose important detail if poorly used
Colour balance adjustment to change ‘feel’ of image...
...whiter to create warm mood
...bluer to create cooler mood/feel
...restore natural colour to flesh tones
Brightness/contrast changes to change appearance of image
...increase in contrast for photos taken on dull days can show more detail
...decrease in contrast for photos taken in bright sun can increase detail in
shadows
Add a new/missing object/replacing an object in the image
...combining elements of different photos to create a new photo...
...covering/obscuring part of the image with another object
Creating a digital illustration/cartoon of the original photo
Changing/adding a different/new/fantasy/magical background
Create an illusion of depth
Create special effects
Adjusting the image itself
...change the transparency of an image
...resizing of photos
...reducing noise in the image
..correcting lens distortion/perspective.

© UCLES 2017 Page 13 of 13


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2017 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a) A compiler executes a high level program one statement at a time 1


before translating the next statement.

A compiler converts object code into source code.

A compiler translates machine code into a high level language


program.

A compiler often produces a separate object code program. 3

1(b) A linker executes a high level program one statement at a time 1


before translating the next statement.
A linker takes one or more source code files and combines them
into a single executable file.
A linker takes one or more object files and combines them into a
3
single executable file.

A linker is used in conjunction with an interpreter.

Question Answer Marks

2 It is okay to send an email to a person you do not know as it does 4


not matter if they find out your email address.
You should always attach a photograph of yourself to an email so
they know who you are.

You should only use websites recommended by teachers. 3

It is acceptable to post a photograph of your school on a social


media site as so many students go there.
You should always think twice before opening an email from an
3
unknown person as it might be spam.
It is okay, for the first time, to meet a person you only know from
the internet on your own.
You should know how to block and report unwanted users from
3
social media sites.
It is acceptable, if you trust them, to give someone you have only
met on the internet your name and address.
When using instant messaging it is okay to use bad language if you
are among friends.
When playing games on the internet you should never use your
3
real name.

© UCLES 2017 Page 2 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(a) Six from: 6

She could give questionnaires to students who walk to school using that
particular road asking about their general health/number of days missed
through illness
She could give questionnaires to students who walk to school using other
roads asking about their general health/number of days missed through
illness
She could interview students who walk to school using that particular road
asking about their general health/number of days missed through illness
She could interview students who walk to school using other roads asking
about their general health/number of days missed through illness
She could observe/keep a count of traffic coming down the busy road
She could observe the amount of traffic/keep a count of traffic coming down
the other roads
She could use sensors to detect the flow of traffic going down the busy road
She could use sensors to detect the flow of traffic going down the other
roads
She could give questionnaires to residents who live in that particular road
asking about their general health
She could give questionnaires to residents who live in other roads asking
about their general health
She could interview residents who live in that particular road asking about
their general health
She could interview residents who live in other roads asking about their
general health.

3(b) Five from: 5

Data gathering may be expensive as other companies may have to be hired


to get it
It may involve having to purchase equipment such as data
loggers/computers/printers
Compared to indirect data sources using direct data sources may be very
expensive in preparing and carrying out the gathering of data
Costs can be incurred in producing the paper for questionnaires
It takes longer to gather data than to acquire data from an indirect data
source
By the time the project is complete/all the data is collected the data may be
out of date
The sample size may be small.

© UCLES 2017 Page 3 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(c) Four from: 4

In questionnaires and interviews the questions may not have been very
clear and the respondents may have misunderstood them
The questions might have been badly phrased
so that the respondent thought they knew the answer Josefine wanted –
resulting in similar answers from different respondents
Questions may have been open-ended allowing the respondent to produce
answers which could not be quantified
In a multi-choice type question there may not have been a sufficient number
of alternatives
The respondents selected for the study may not have been very
representative
There is the possibility that Josefine may have made errors when collecting
it
Josefine may have made errors when entering the collected data into the
computer
If the data was collected automatically by sensors the
computer/microprocessor may not have been set up properly to accurately
interpret the readings.

3(d) Three from: 3

Speeds up data entry


Accuracy of entering data is increased
When data has been coded it makes it easier to use validation
Less storage space is required
The smaller the size of the database, the faster it will be to search and
produce results.

3(e) Three from: 3

The code B does not give a clear idea of what shade of blue
The approximate age of the driver is too vague/too general
and would be difficult to use in calculations/graphs
There may be many makes of car beginning with the same letter.

© UCLES 2017 Page 4 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will explain both the advantages and disadvantages of a range
of different output devices using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will explain the advantages and disadvantages of more than
one output device.
Examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will only address some aspects of the use of output devices.
Examples, if used, may lack relevance.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may include:

To print the tickets:


The advantage of a laser printer is that the quality of print will be good
enabling passengers to see their flight number and seat number clearly
An inkjet printer would produce higher quality tickets
An inkjet printer may be relatively slow causing queues at the ticketing
department
A dot matrix printer would not be as clear as a laser printer or inkjet printer
A laser printer might not be good for this as it takes some time to produce a
first copy and there wouldn’t be more than one copy
A dot matrix printer may be relatively slow causing queues at the ticketing
department

Producing the flight lists:


The list may be long and it may be difficult to correlate the sheets
A dot matrix printer may be better as fan fold stationery could be used
Less risk of a dot matrix printer running out of paper
Flight lists would be continuous
More easily collated using a dot matrix printer
May need to change cartridges more frequently if an inkjet printer were used
Quality of printout would not be an issue for flight lists
Noise of dot matrix would not be an issue at a busy airport.

© UCLES 2017 Page 5 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5(a) =COUNTIFS(K3:K20,”-“,L3:L20,”-“) 6

=COUNTIFS() 2 marks
(=COUNTIF() 1 mark)
(K3:K20 1 mark
,”-“, immediately after K20 1 mark
L3:L20 immediately after ,”-“, 1 mark
,”-“) 1 mark

5(b) 5
Select data, filter 1 mark
Filter on column K for “-“ 1 mark
Filter on column L for “-“ 1 mark
Highlight column N 1 mark
Select PRINT and PRINT selection. 1 mark

Question Answer Marks

6 Max six from: 6

Create a query and select the fields Workers_ID, Salary and Department
In the criteria box under Salary, type > 35 000
In the criteria box under Department, type like “*rolling” – 2 marks
“Hot rolling” OR “Cold rolling” – 1 mark only
Deselect the Department field for showing
Run and save the query
Create the report using this query
In the report section, edit and format the report.

© UCLES 2017 Page 6 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7 Eight from: 8

Advantages:
The costs of fuel, aircraft maintenance and insurance of a regular aircraft
are far greater than the running and maintenance costs of a flight simulator
The environment benefits from flight training in a simulator, as there is no air
and noise pollution created by a flight simulator
Situations can be tackled in a flight simulator without putting the trainee and
the flight training instructor in danger
If there is an accident there is no cost to replace parts unlike a real plane
Emergency procedures, adverse weather conditions and system failures
can be more easily/quickly produced or recreated in a flight simulator
There is less time wasted on booking aircraft for flight training/scheduling
flights/ waiting for the aircraft to warm up
Less time wasted travelling to the desired destination to undergo specific
flight training instruction
The environmental conditions in a simulator are far more comfortable than
flight training in a real aircraft as the temperature and humidity are controlled
in a flight simulator
The level of noise in a flight simulator is not as deafening as in an aircraft
makes the communication between the instructor and trainee much easier

Disadvantages:
The simulator response will not always be exactly the same as an actual
airplane, as there too many variables
Sometimes pilots become bolder/more overconfident after training on the
simulator and overreact to real flight situations
overuse of parts such as the rudder can cause damage to a real aircraft
but not in the simulator
Amount of stress the pilot would be under in dangerous situations is less
likely to be created
Length of training session is more likely to be shorter than a realistic flight
making it difficult to recreate boredom/fatigue of a real flight.

Must have at least two from each to gain full marks.


1 mark is available for a reasoned conclusion/opinion.

Question Answer Marks

8(a)(i) Two from: 2

Both tables can have only one record on either side of the relationship
Student_ID in students_1 is connected to Student_ID in students_2
students_2 and students_1 have the same key field
students_1 and students_2 could be combined without affecting the
database.

© UCLES 2017 Page 7 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8(a)(ii) Two from: 2

The table contains individual records that each relate to many records in the
related table
A single Student_ID in students_1 table relates to many records in the
joined_subject table
A single subject_code in subjects table relates to many records in the
joined_subject table.

8(a)(iii) Four from: 4

In relational database design, a many-to-many relationship is strictly


speaking not allowed/is virtual
To get around the problem of having a many-to-many relationship the many-
to-many relationship needs to be broken down into two one-to-many
relationships
Using a third table, commonly called a “join table”, in this case the
joined_subject table
Each record in the “join table” would have the foreign key fields of the two
tables it is joining together
The students_1 could be in a many-to-many relationship with the subjects
table.

8(b) Four from: 4

Every foreign key value has a matching value in the corresponding primary
key
Referential integrity uses these to prevent the deletion of related records
It can alert if the user tries to delete a record which is related to another one
Queries will begin to fail if the relationships do not match
If a table is relying on the keys in another table, then relationships between
the two can be lost if bad data is entered into one location
Referential integrity can be used to ensure foreign key values are valid.

Question Answer Marks

9(a) Three from: 3

Proprietary software is software that is owned by an individual or a company


(usually the one that developed it)
There are almost always major restrictions on its use
A software vendor delineates the specific terms of use in an end-user
license agreement
Its source code is almost always kept secret
Usually covered by copyright which provides a legal basis for its owner to
establish exclusive rights.

© UCLES 2017 Page 8 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

9(b) Three from: 3

Can be used and implemented by anyone


An open source file format can be used by both proprietary and free and
open source software
Also called free file formats if they are not covered by any copyrights/patents
So that anyone may use them at no monetary cost for any desired purpose.

Question Answer Marks

10 Four from: 4

Digital audio is a series of discrete bursts called samples


The frequency that these samples occur is so fast it sounds like a
continuous sound
The sampling rate is the number of samples within a given period of time
A higher sampling rate sounds better than a lower rate
Each sample uses up storage space so the lower the sampling rate the less
storage capacity is required.

© UCLES 2017 Page 9 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

11 Eight from: 8

Batch processing would be used by payroll department to pay wages


Batch processing would be used if the scientists had collected a very large
amount of data offline and need to now process it all in one go
Transaction file of hours worked is kept
Master file of workers details/rate of pay per hour
Transaction file is used with master file to update master file/produce
payslips
Jobs are set up so they can be run to completion without human interaction
The input data are collected into batches and each batch is processed as a
whole
Batch processing can occur when the computing resources are less busy
Batches can be stored up during working hours and then executed during
the evening/whenever the computer is idle
Batch processing is particularly useful for operations that require the
computer or a peripheral device for an extended period of time
Real-time processing would be suitable for controlling the rockets
Real-time processing causes a response within specified time constraints
Real-time responses are in the order of milliseconds, and sometimes
microseconds
Real-time means that the inputs are processed and produce an output
which in turn affects the input
Controlling rockets often involves the use of sensors and control systems
A computer system used for real-time processing is often used 24 hours a
day for the same task
Real-time data processing gives the scientists the ability to take immediate
action for those times when acting within seconds is significant
If a rocket is off course for just a short period of time its speed is such it
would be off course by a large distance
If the rocket veers off course the computer would immediately fire engines to
correct it.

© UCLES 2017 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2017
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2017 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2017 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

1(a) A compiler executes a high level program one statement at a time 1


before translating the next statement.

A compiler converts object code into source code.

A compiler translates machine code into a high level language


program.

A compiler often produces a separate object code program. 3

1(b) A linker executes a high level program one statement at a time 1


before translating the next statement.
A linker takes one or more source code files and combines them
into a single executable file.
A linker takes one or more object files and combines them into a
3
single executable file.

A linker is used in conjunction with an interpreter.

Question Answer Marks

2 It is okay to send an email to a person you do not know as it does 4


not matter if they find out your email address.
You should always attach a photograph of yourself to an email so
they know who you are.

You should only use websites recommended by teachers. 3

It is acceptable to post a photograph of your school on a social


media site as so many students go there.
You should always think twice before opening an email from an
3
unknown person as it might be spam.
It is okay, for the first time, to meet a person you only know from
the internet on your own.
You should know how to block and report unwanted users from
3
social media sites.
It is acceptable, if you trust them, to give someone you have only
met on the internet your name and address.
When using instant messaging it is okay to use bad language if you
are among friends.
When playing games on the internet you should never use your
3
real name.

© UCLES 2017 Page 2 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(a) Six from: 6

She could give questionnaires to students who walk to school using that
particular road asking about their general health/number of days missed
through illness
She could give questionnaires to students who walk to school using other
roads asking about their general health/number of days missed through
illness
She could interview students who walk to school using that particular road
asking about their general health/number of days missed through illness
She could interview students who walk to school using other roads asking
about their general health/number of days missed through illness
She could observe/keep a count of traffic coming down the busy road
She could observe the amount of traffic/keep a count of traffic coming down
the other roads
She could use sensors to detect the flow of traffic going down the busy road
She could use sensors to detect the flow of traffic going down the other
roads
She could give questionnaires to residents who live in that particular road
asking about their general health
She could give questionnaires to residents who live in other roads asking
about their general health
She could interview residents who live in that particular road asking about
their general health
She could interview residents who live in other roads asking about their
general health.

3(b) Five from: 5

Data gathering may be expensive as other companies may have to be hired


to get it
It may involve having to purchase equipment such as data
loggers/computers/printers
Compared to indirect data sources using direct data sources may be very
expensive in preparing and carrying out the gathering of data
Costs can be incurred in producing the paper for questionnaires
It takes longer to gather data than to acquire data from an indirect data
source
By the time the project is complete/all the data is collected the data may be
out of date
The sample size may be small.

© UCLES 2017 Page 3 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

3(c) Four from: 4

In questionnaires and interviews the questions may not have been very
clear and the respondents may have misunderstood them
The questions might have been badly phrased
so that the respondent thought they knew the answer Josefine wanted –
resulting in similar answers from different respondents
Questions may have been open-ended allowing the respondent to produce
answers which could not be quantified
In a multi-choice type question there may not have been a sufficient number
of alternatives
The respondents selected for the study may not have been very
representative
There is the possibility that Josefine may have made errors when collecting
it
Josefine may have made errors when entering the collected data into the
computer
If the data was collected automatically by sensors the
computer/microprocessor may not have been set up properly to accurately
interpret the readings.

3(d) Three from: 3

Speeds up data entry


Accuracy of entering data is increased
When data has been coded it makes it easier to use validation
Less storage space is required
The smaller the size of the database, the faster it will be to search and
produce results.

3(e) Three from: 3

The code B does not give a clear idea of what shade of blue
The approximate age of the driver is too vague/too general
and would be difficult to use in calculations/graphs
There may be many makes of car beginning with the same letter.

© UCLES 2017 Page 4 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

4 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will explain both the advantages and disadvantages of a range
of different output devices using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will explain the advantages and disadvantages of more than
one output device.
Examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will only address some aspects of the use of output devices.
Examples, if used, may lack relevance.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may include:

To print the tickets:


The advantage of a laser printer is that the quality of print will be good
enabling passengers to see their flight number and seat number clearly
An inkjet printer would produce higher quality tickets
An inkjet printer may be relatively slow causing queues at the ticketing
department
A dot matrix printer would not be as clear as a laser printer or inkjet printer
A laser printer might not be good for this as it takes some time to produce a
first copy and there wouldn’t be more than one copy
A dot matrix printer may be relatively slow causing queues at the ticketing
department

Producing the flight lists:


The list may be long and it may be difficult to correlate the sheets
A dot matrix printer may be better as fan fold stationery could be used
Less risk of a dot matrix printer running out of paper
Flight lists would be continuous
More easily collated using a dot matrix printer
May need to change cartridges more frequently if an inkjet printer were used
Quality of printout would not be an issue for flight lists
Noise of dot matrix would not be an issue at a busy airport.

© UCLES 2017 Page 5 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

5(a) =COUNTIFS(K3:K20,”-“,L3:L20,”-“) 6

=COUNTIFS() 2 marks
(=COUNTIF() 1 mark)
(K3:K20 1 mark
,”-“, immediately after K20 1 mark
L3:L20 immediately after ,”-“, 1 mark
,”-“) 1 mark

5(b) 5
Select data, filter 1 mark
Filter on column K for “-“ 1 mark
Filter on column L for “-“ 1 mark
Highlight column N 1 mark
Select PRINT and PRINT selection. 1 mark

Question Answer Marks

6 Max six from: 6

Create a query and select the fields Workers_ID, Salary and Department
In the criteria box under Salary, type > 35 000
In the criteria box under Department, type like “*rolling” – 2 marks
“Hot rolling” OR “Cold rolling” – 1 mark only
Deselect the Department field for showing
Run and save the query
Create the report using this query
In the report section, edit and format the report.

© UCLES 2017 Page 6 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

7 Eight from: 8

Advantages:
The costs of fuel, aircraft maintenance and insurance of a regular aircraft
are far greater than the running and maintenance costs of a flight simulator
The environment benefits from flight training in a simulator, as there is no air
and noise pollution created by a flight simulator
Situations can be tackled in a flight simulator without putting the trainee and
the flight training instructor in danger
If there is an accident there is no cost to replace parts unlike a real plane
Emergency procedures, adverse weather conditions and system failures
can be more easily/quickly produced or recreated in a flight simulator
There is less time wasted on booking aircraft for flight training/scheduling
flights/ waiting for the aircraft to warm up
Less time wasted travelling to the desired destination to undergo specific
flight training instruction
The environmental conditions in a simulator are far more comfortable than
flight training in a real aircraft as the temperature and humidity are controlled
in a flight simulator
The level of noise in a flight simulator is not as deafening as in an aircraft
makes the communication between the instructor and trainee much easier

Disadvantages:
The simulator response will not always be exactly the same as an actual
airplane, as there too many variables
Sometimes pilots become bolder/more overconfident after training on the
simulator and overreact to real flight situations
overuse of parts such as the rudder can cause damage to a real aircraft
but not in the simulator
Amount of stress the pilot would be under in dangerous situations is less
likely to be created
Length of training session is more likely to be shorter than a realistic flight
making it difficult to recreate boredom/fatigue of a real flight.

Must have at least two from each to gain full marks.


1 mark is available for a reasoned conclusion/opinion.

Question Answer Marks

8(a)(i) Two from: 2

Both tables can have only one record on either side of the relationship
Student_ID in students_1 is connected to Student_ID in students_2
students_2 and students_1 have the same key field
students_1 and students_2 could be combined without affecting the
database.

© UCLES 2017 Page 7 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

8(a)(ii) Two from: 2

The table contains individual records that each relate to many records in the
related table
A single Student_ID in students_1 table relates to many records in the
joined_subject table
A single subject_code in subjects table relates to many records in the
joined_subject table.

8(a)(iii) Four from: 4

In relational database design, a many-to-many relationship is strictly


speaking not allowed/is virtual
To get around the problem of having a many-to-many relationship the many-
to-many relationship needs to be broken down into two one-to-many
relationships
Using a third table, commonly called a “join table”, in this case the
joined_subject table
Each record in the “join table” would have the foreign key fields of the two
tables it is joining together
The students_1 could be in a many-to-many relationship with the subjects
table.

8(b) Four from: 4

Every foreign key value has a matching value in the corresponding primary
key
Referential integrity uses these to prevent the deletion of related records
It can alert if the user tries to delete a record which is related to another one
Queries will begin to fail if the relationships do not match
If a table is relying on the keys in another table, then relationships between
the two can be lost if bad data is entered into one location
Referential integrity can be used to ensure foreign key values are valid.

Question Answer Marks

9(a) Three from: 3

Proprietary software is software that is owned by an individual or a company


(usually the one that developed it)
There are almost always major restrictions on its use
A software vendor delineates the specific terms of use in an end-user
license agreement
Its source code is almost always kept secret
Usually covered by copyright which provides a legal basis for its owner to
establish exclusive rights.

© UCLES 2017 Page 8 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

9(b) Three from: 3

Can be used and implemented by anyone


An open source file format can be used by both proprietary and free and
open source software
Also called free file formats if they are not covered by any copyrights/patents
So that anyone may use them at no monetary cost for any desired purpose.

Question Answer Marks

10 Four from: 4

Digital audio is a series of discrete bursts called samples


The frequency that these samples occur is so fast it sounds like a
continuous sound
The sampling rate is the number of samples within a given period of time
A higher sampling rate sounds better than a lower rate
Each sample uses up storage space so the lower the sampling rate the less
storage capacity is required.

© UCLES 2017 Page 9 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2017

Question Answer Marks

11 Eight from: 8

Batch processing would be used by payroll department to pay wages


Batch processing would be used if the scientists had collected a very large
amount of data offline and need to now process it all in one go
Transaction file of hours worked is kept
Master file of workers details/rate of pay per hour
Transaction file is used with master file to update master file/produce
payslips
Jobs are set up so they can be run to completion without human interaction
The input data are collected into batches and each batch is processed as a
whole
Batch processing can occur when the computing resources are less busy
Batches can be stored up during working hours and then executed during
the evening/whenever the computer is idle
Batch processing is particularly useful for operations that require the
computer or a peripheral device for an extended period of time
Real-time processing would be suitable for controlling the rockets
Real-time processing causes a response within specified time constraints
Real-time responses are in the order of milliseconds, and sometimes
microseconds
Real-time means that the inputs are processed and produce an output
which in turn affects the input
Controlling rockets often involves the use of sensors and control systems
A computer system used for real-time processing is often used 24 hours a
day for the same task
Real-time data processing gives the scientists the ability to take immediate
action for those times when acting within seconds is significant
If a rocket is off course for just a short period of time its speed is such it
would be off course by a large distance
If the rocket veers off course the computer would immediately fire engines to
correct it.

© UCLES 2017 Page 10 of 10


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/01


*0123456789*

Paper 1 Theory For Examination from 2017


SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

© UCLES 2015 [Turn over


2

1 (a) Describe the difference between data and information.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) There are different types of data.

Tick four correct statements in the following table.

9
True and false are examples of Boolean data
A field containing the value 253 would be a field containing text data
245.6 is an integer
All numbers are stored as decimals
‘13 cm’ is an example of alphanumeric data
An integer stored in a field is a form of numeric value
Currency is a type of numeric data
A real number is an integer which has already been used in a database
How many times a student has taken an exam would be stored as a Date/time
data type
A percentage value is usually stored as text as it has a percentage sign

[4]

© UCLES 2015 9626/01/SP/17


3

2 There are many ways of changing data to suit a purpose including coding, encoding and encryption
of data. Coding data in a field containing the gender of a person, for example, would involve
coding ‘male’ as ‘m’ and ‘female’ as ‘f’.

(a) Tick the correct statement regarding the coding of data.

9
A disadvantage of coding data is that it makes the data very difficult to read and
understand
An advantage of coding data is that it saves storage space
A disadvantage of coding data is that it becomes much slower to type in the data
An advantage of coding data is that codes are never complicated

[1]

(b) Tick the correct statement regarding the encoding of data.

9
Encoding data is a form of validation
Text and numbers are the only data types that can be encoded
Converting digital data to analogue data is a form of encoding data
Encoding is done to deliberately conceal the content of the data

[1]

(c) Tick the correct statement regarding the encryption of data.

9
Encrypting data prevents hackers from intercepting it
Encryption is the conversion of data into a form that cannot be easily understood
by unauthorised users
The two main types of encryption are known as public key encryption and open
encryption
Decryption is the process of further converting encrypted data into another more
complicated encrypted form

[1]

© UCLES 2015 9626/01/SP/17 [Turn over


4

3 Giving examples, explain what is meant by:

(a) application software

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) system software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9626/01/SP/17


5

4 Describe the characteristics of a gesture based user interface.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [3]

© UCLES 2015 9626/01/SP/17 [Turn over


6

5 Here is a small section of a spreadsheet used to calculate the weekly wages of the workers in a
company.

A B C D E F
1 First Second Hours worked Hourly rate Weekly wage ($) Full
name name name
2 John Smith 40 8.50 =C2*D2
3 Johann Schmidt 42 9.25 =C3*D3
4 Felix Schnell 38 8.75 =C4*D4
5 Maurice LaPorte 46 11.50 =C5*D5
=SUM(C2:C5) =MAX(D2:D5) =AVERAGE(E2:E5)

(a) Using examples from the spreadsheet, explain what is meant by a cell reference.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) This spreadsheet uses formulae and functions. Explain the difference between formulae and
functions.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/01/SP/17


7

(c) The manager of the company wants the full name of the worker printed on the payslip. In
order to do this a formula will need to be used in cell F2 combining the first name and the
second name separated by a space.

Write down the formula which uses a function to combine this data.

.............................................................................................................................................. [4]

(d) The manager wants to see immediately if a worker earns more than $500 per week, without
reading through the spreadsheet.

Explain what you would do in cells E2 to E5 to make it easier for her to see this.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/01/SP/17 [Turn over


8

(e) Relative cell referencing has been used in the spreadsheet. Using examples from this
spreadsheet, explain why the use of absolute referencing would not be suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(f) This spreadsheet could be used for modelling purposes. An example of modelling is the use
of simulators for pilot training.

Describe three advantages of using computer simulations for pilot training rather than the
real thing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2015 9626/01/SP/17


9

6 A shop selling Konia mobile (cell) phones keeps records of all the phones it sells.
The shop only stocks three models but each model has either 32 or 64 GB of memory.
An example of the shop’s database is given below.

Customer Model Price ($) Memory (GB)


K Spencer 1278C3 500 32
J Sandhu 1273C6 400 64
M Akhtar 1273C3 300 32
Te Won 1275C6 450 64
B Perez 1275C3 350 32
Espanita di Stefano 1278C6 600 64
B Smith 1275C6 450 64
J Johannson 1275C3 350 32
Su Li 1278C6 600 64

(a) A validation check is needed to make sure that only valid model numbers can be accepted.
Name this validation check and describe how it would work.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/01/SP/17 [Turn over


10

(b) Giving examples, explain how consistency checks could be used to ensure that the data that
is entered in the shop’s database is valid.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(c) The shop is sending a standard letter to owners of the 1278C6 model informing them about a
defect.

Using information from the shop’s database, explain how you would set up such a letter to
customers who own that particular model.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/01/SP/17


11

(d) The data in the shop’s database is in unnormalised form. Complete the table below as
necessary to make the database in first normal form (1NF).

[4]

(e) Give two advantages of normalising a database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9626/01/SP/17 [Turn over


12

7 A head teacher wishes to use a computer to create a newsletter which will keep parents up to date
with events at the school.

(a) Name two software types that he could use.

type 1 ........................................................................................................................................

...................................................................................................................................................

type 2 ........................................................................................................................................

.............................................................................................................................................. [2]

(b) Compare and contrast the use of these software types.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/01/SP/17


13

8 The internet is used by many individuals in the world today.

(a) There are a number of malware issues associated with using the internet.
Other than viruses, describe three of these issues.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/01/SP/17 [Turn over


14

(b) Discuss the reasons why many people use the internet for communication, while some people
do not.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2015 9626/01/SP/17


15

(c) Explain what is meant by the internet and the World Wide Web. In your answer include
features of the internet which do not use the World Wide Web.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/01/SP/17 [Turn over


16

9 Evaluate the differences between compilers and interpreters.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9626/01/SP/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/03


*0123456789*

Paper 3 Advanced Theory For Examination from 2017


SPECIMEN PAPER
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams or graphs.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Calculators must not be used on this paper.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

© UCLES 2015 [Turn over


2

1 A television station makes its programmes in studios on the ground and transmits them via
satellites to receivers in viewers’ homes.

(a) Describe how a programme is transmitted from the station’s studio to a viewer’s satellite
receiver.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(b) Explain two advantages to the viewer of using satellites to receive television programmes.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9626/03/SP/17


3

(c) Explain two disadvantages to the viewer of using satellites to receive television programmes.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9626/03/SP/17 [Turn over


4

2 Anderson Chemicals have a computerised payroll system which has recently become out of date.

Jasbir, a systems analyst, has been asked to update the current system and will need to research
this problem.

(a) Discuss the advantages and disadvantages of the different methods Jasbir could use for
collecting information.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2015 9626/03/SP/17


5

(b) After developing the new computerised payroll system Jasbir will need to create a test plan.

Describe how he would do this, including the type of testing he would carry out.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

(c) When the new computerised payroll system is implemented, perfective maintenance will be
carried out.

Describe two other types of maintenance and suggest reasons why they would be needed in
this scenario.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/03/SP/17 [Turn over


6

3 Safina, a project manager, uses a number of project management tools for planning the conversion
of an existing classroom into a new computer room.

Describe how Safina would use these tools to plan the project.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2015 9626/03/SP/17


7

4 A bank has a number of offices all over the world. Each office has a local area network (LAN). The
LANs are connected together to create a wide area network (WAN) for use by its staff.

One of the office managers wants to improve the speed and efficiency of his office LAN. He wants
to replace the existing copper cabling with an alternative communication method.

(a) Evaluate three alternative methods of transmission the manager could use including optical
methods.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]

© UCLES 2015 9626/03/SP/17 [Turn over


8

(b) Describe the role of three types of server that might be found in an office LAN.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/03/SP/17


9

(c) Explain how the bank could use encryption techniques to attempt to prevent its data from
being read by unauthorised people.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/03/SP/17 [Turn over


10

5 In computer programming, explain what is meant by the following terms.

(a) variable

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) iteration

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) loop

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2015 9626/03/SP/17


11

6 ‘People are spending a large amount of time using social networking sites. This has important
positive and negative implications for society.’

Analyse this statement.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2015 9626/03/SP/17 [Turn over


12

7 RockIT is an international company. The senior managers are based on the same site
and use face-to-face meetings to communicate with each other. The senior managers use
video-conferencing to communicate with the company’s other offices around the world.

(a) Describe the features of a video-conference.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/03/SP/17


13

(b) The senior managers meet in the same room each week in a face-to-face meeting.

Explain why the senior managers would use face-to-face meetings rather than
video-conferencing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2015 9626/03/SP/17 [Turn over


14

8 Shafiq has just logged on to a secure website.

(a) Describe how he knows that the website is secure.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Describe the steps that the web browser will go through to ensure that Shafiq has logged on
to a secure website.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2015 9626/03/SP/17


15

9 (a) Describe what is meant by the use of biometrics when protecting devices from being accessed
by unauthorised people.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Many people are becoming concerned that too much reliance is being placed on the use of
biometrics to protect devices from being accessed by unauthorised people.

Evaluate the suitability of biometrics for this purpose.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [8]
© UCLES 2015 9626/03/SP/17
16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2015 9626/03/SP/17


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/01


Paper 1 Theory For Examination from 2017
SPECIMEN MARK SCHEME
1 hour 45 minutes

MAXIMUM MARK: 90

This document consists of 10 printed pages.

© UCLES 2015 [Turn over


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


1(a) Two from: 2

Data usually refers to raw data/unprocessed data


Information is data that has been processed in such a way as to be
meaningful…
…to the person who receives it
Information is data that has structure and context
1(b) Award 1 mark for each correct statement ticked. 4

True and false are examples of Boolean data 9


A field containing the value 253 would be a field containing text
data
245.6 is an integer
All numbers are stored as decimals
‘13 cm’ is an example of alphanumeric data 9
An integer stored in a field is a form of numeric value 9
Currency is a type of numeric data 9
A real number is an integer which has already been used in a
database
How many times a student has taken an exam would be stored
as a Date/time data type
A percentage value is usually stored as text as it has a
percentage sign

Question Answer Marks


2(a) Award 1 mark for correct statement ticked. 1

A disadvantage of coding data is that it makes the data very


difficult to read and understand
An advantage of coding data is that it saves storage space 9
A disadvantage of coding data is that it becomes much slower to
type in the data
An advantage of coding data is that codes are never complicated

2(b) Award 1 mark for correct statement ticked. 1

Encoding data is a form of validation


Text and numbers are the only data types that can be encoded
Converting digital data to analogue data is a form of encoding
9
data
Encoding is done to deliberately conceal the content of the data

© UCLES 2015 Page 2 of 10


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


2(c) Award 1 mark for correct statement ticked. 1

Encrypting data prevents hackers from intercepting it


Encryption is the conversion of data into a form that cannot be
9
easily understood by unauthorised users
The two main types of encryption are known as public key
encryption and open encryption
Decryption is the process of further converting encrypted data
into another more complicated encrypted form

Question Answer Marks


3(a) Award 1 mark for each correct answer up to a maximum of 3. 3

Three from:

Application software is a set of one or more programs designed to carry out


operations for a specific application…
…other than system maintenance functions
Types of application software include spreadsheet, database, DTP, word
processing software (must have at least two)
3(b) Award 1 mark for each correct answer up to a maximum of 3. 3

Three from:

System software refers to the operating system and all utility programs that
manage computer resources
System software includes BIOS, compilers, interpreters, system utilities (must
have two)
System software is a type of computer program that is designed to run a
computer’s hardware and application programs
System software is the interface between the hardware and user applications

Question Answer Marks


4 Award 1 mark for each correct answer up to a maximum of 3. 3

Three from:

Provides an interface that does not need the support of a device


Gesture interfaces are graphical user interfaces which accept input in a form
of hand gestures
It is a virtual world to which the user is connected digitally
Can point a finger at the computer screen so that the cursor will move
accordingly

© UCLES 2015 Page 3 of 10 [Turn over


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


5(a) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

A cell reference identifies the cell that is being referred to


A cell reference consists of the column letter and row number that intersect at
the cell’s location
For example cell C1 is in column C and in row 1
5(b) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

A formula is statement written by the user to perform a calculation


Formulae can be as simple or as complex as the user wants
A function is also a formula, but is predefined/comes with the spreadsheet
software. Instead of having to accurately type out the details of the formula,
the function acts as a shortcut to carry it out.

Allow up to 1 mark for an example from the spreadsheet.


For example =SUM is a function whereas =C2*D2 is a formula
5(c) =CONCATENATE(A2,“ ”,B2) 4
1 mark for CONCATENATE
1 mark for A2
1 mark for “ ”
1 mark for B2
5(d) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

Use conditional formatting


Highlight E2 to E5
Select conditional formatting
Select ‘greater than’
Type in 500
Select colour of font/background
5(e) Award 1 mark for each correct answer up to a maximum of 3. 3

Three from:

Absolute cell referencing is used when formulae are replicated


It is used to keep cell references constant as they are replicated
If it was used in column E the weekly wage for every worker would remain the
same
Here the wage needs to be calculated separately for each worker and the
values do need to change

© UCLES 2015 Page 4 of 10


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


5(f) Award 1 mark for each correct answer up to a maximum of 3. 3

Three from:

If the plane crashed in real life the pilot might die whereas nothing would
happen to him/her in a simulator
If the plane crashed in real life the plane would cost a lot to replace whereas
nothing would happen to the simulator
Extreme weather conditions can be made to order in a simulator but you
might have to wait a long time for them to happen in real life
The cost of running a simulator is cheaper than the cost of fuel in a real plane
6(a) Award 1 mark. 4

Name of validation check:

Lookup check

Award 1 mark for each correct answer up to a maximum of 3.

Three from:

A table of the three models would be stored


Data is entered into a cell with the rule
Data is compared to entries in the table
If data matches an entry it is allowed/If data entered does not match any of
the entries in the table it is rejected
6(b) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

Rule could be that price must match model number


If the model number is 1273C3 price must be $300
If the model number is 1273C6 price must be $400
If the model number is 1275C3 price must be $350
If the model number is 1275C6 price must be $450
If the model number is 1278C3 price must be $500
If the model number is 1278C6 price must be $600

Rule could be that memory must match model number


If model number ends in 3 memory must be 32
If model number ends in 6 memory must be 64

© UCLES 2015 Page 5 of 10 [Turn over


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


6(c) Award 1 mark for each correct answer up to a maximum of 4. 6

Four from:

Load word processing/database software


Make sure the database/word processed document has been saved with an
appropriate file name
Link the document to the database
Type in the contents of the letter
Add address block
Appropriate mention of insertion of merged field, e.g. in the space to the right
of ‘Dear’, choose insert merge field

Award 1 mark for each correct answer up to a maximum of 2.

Two from:

select the Customer field


select edit recipient list
type in filter condition/select filter condition
select finish and merge
6(d) 4
Memory 1 mark, 0 marks if there are
Model Price ($)
(GB) additional/missing headings
1273C3 300 32
1273C6 400 64
3 marks, subtract 1 mark for each
1275C3 350 32 additional/missing record down to a
1275C6 450 64 minimum of 0 marks (do not award
negative marks)
1278C3 500 32
1278C6 600 64

6(e) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Data is not repeated/no redundant data improving data integrity and reducing
errors
Data is not repeated/no redundant data saving storage space
Reinforces referential integrity

Question Answer Marks


7(a) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Use a word processor (to produce a newsletter)


Use a desktop publishing package (to produce a newsletter)
Use a web authoring package (to produce web pages to show the events)
Use presentation software (to produce a slide show to show the events)

© UCLES 2015 Page 6 of 10


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


7(b) Award 1 mark for each correct answer up to a maximum of 6. 6

Only the two packages named in 7(a) can be compared.

Six from:

Word processor versus DTP


DTP software includes the key elements involved in producing these
products...
... such as typesetting, page layout and graphic design
DTP software is a little more difficult to use than regular word processing
software because there are so many different options to consider
DTP is used by graphic designers
Arrangement of the text on the word processing page is largely linear
Word processing has few options to set text precisely where the user wants
DTP packages have a wider selection of import and output options for various
forms of content
DTP packages are better able to combine text and graphics in a single
document

Presentation vs DTP/WP
You can use video/animations in presentations
You can have sound in presentations
Ink/paper is more expensive than slideshow presentation
Easier/less costly to update
Cannot be sure everybody would see presentation/can deliver newsletter to
every home/might have presentation at an inconvenient time for some parents
Producing presentation would take longer than WP document
You have to pay someone to deliver hard copies

Web pages vs DTP/WP


You can use video/animations in web pages
You can have sound on web pages
Ink/paper is more expensive than web pages
Easier/less costly to update
Cannot be sure everybody would see website/can deliver newsletter to every
home
Producing web pages would take longer than WP document
You may have to pay someone to deliver hard copies
You have to pay for an ISP
You may have to pay extra to host a website

Web pages vs presentation


With presentation can know exactly which parents have been informed
With web pages have to pay for an ISP
You may have to pay extra to host a website
Presentation is easier/less costly to update
Less information on a slide than a web page
With web pages parents can respond interactively
Fewer skills needed for presentation

© UCLES 2015 Page 7 of 10 [Turn over


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


8(a) Award a maximum of 2 marks per answer, up to a maximum of three types of 6
malware.

A Trojan Horse is generally a non-self-replicating program containing


malicious code that, when executed, carries out actions, typically causing loss
of data
Malicious programs are classified as Trojans if they do not attempt to inject
themselves into other files...
...or otherwise propagate themselves

A worm is a computer program that replicates itself in order to spread to other


computers
It uses a computer network to spread itself
Unlike a computer virus, it does not need to attach itself to an existing
program

Spyware is software that aids in gathering information about a person or


organisation without their knowledge
It may send such information to another entity without the consumer’s
consent, asserts control over a computer without the consumer’s knowledge
It detects key presses of the computer user

Adware is a form of spyware that collects information about the user in order
to display advertisements in the Web browser
Some applications that contain adware track the user’s internet surfing habits
in order to serve ads related to them

A rootkit is a type of software designed to hide the fact that an operating


system has been compromised...
…sometimes by replacing vital executables
Rootkits allow viruses and malware to “hide in plain sight” by disguising as
necessary files that antivirus software will overlook
Rootkits themselves are not harmful – they are simply used to hide malware,
bots and worms

Malicious bots are self-propagating malware designed to infect a host and


connect back to a central server or servers
The servers act as a command and control (C&C) centre for an entire network
of compromised devices
Hackers can launch flood-type attacks against their target(s)
In addition to the worm-like ability to self-propagate, bots can act as spyware

Ransomware is a type of malware which restricts access to the computer


system that it infects
It demands a ransom paid to the creator(s) of the malware in order for the
restriction to be removed
Some forms of ransomware encrypt files on the system’s hard drive

© UCLES 2015 Page 8 of 10


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


8(b) To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will address both aspects of the question and
discuss/consider different reasons as to why not all people use the internet for
communication.
The issues raised will be justified. There will be a reasoned
conclusion.
The information will be relevant, clear, organised and presented in a
structured and coherent format.

Level 2 (4–6 marks)


Candidates will address both aspects of the question and
discuss/consider different uses, although development of some of
the points will be limited to one aspect of the question.
There will be a conclusion.
For the most part the information will be relevant and presented in a
structured and coherent format.

Level 1 (1–3 marks)


Candidates may only address one aspect, and give basic reasons.
Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid comment.

Examples:

Why people use the internet:

Individuals send emails to communicate with others to gain a reply speedily


Social networking to communicate with friends and family members
Communication – between companies using IM, VOIP and web/audio/video
conferencing because cheaper than organising face-to-face meetings
News services – to find the latest news or sports scores

Why people do not use the internet:

Some may be reluctant to send emails because of malware, speed of reply,


impersonal nature
People may not want their children to use the internet because of esafety, and
children could become addicted and not do their work
Those that do not use the internet are mainly those that suffer as the result of
the digital divide
People and regions that do not have access to aspects of modern technology,
or those that have restricted access
Can be people who live in rural areas
Can be people who are uneducated
Can be people who are poor
Can be people who are older who do not wish to learn to use it
Some might prefer face-to-face contact

© UCLES 2015 Page 9 of 10 [Turn over


9626/01 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


8(b) Can be people who reside in less industrially developed nations
Can be people who have lower-performance computers…
…lower-speed wireless connections…
…lower-priced connections such as dial-up…
…and limited access to subscription-based content
Smaller, traditional companies may be reluctant because of cost/security
issues
Many people prefer to read hard copies of newspapers as they can take a
newspaper with them and read it anywhere
8(c) Award 1 mark for each correct answer up to a maximum of 6. 6

Six from:

The internet is an international network of networks of computers


The internet consists of hardware
The World Wide Web makes use of hypertext to access the various forms of
information available on the internet
The World Wide Web is the system used to access the internet
The web is accessed through browsers
The World Wide Web is not the only service provided on the internet
Other uses of the internet include email and instant messaging

Question Answer Marks


9 Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

The compiler’s conversion is made just once and after that the same binary
code can be distributed to the user’s machines where it can be executed
without further translation thereby saving time compared to an interpreted
program
Whereas an interpreted program is distributed as source code so it needs
to be translated in each final machine, which takes more time than using
compiled code…
…however this does make the program distribution independent of the
machine’s architecture whereas the compiled version will only run on
machines with a specific processor’s architecture, thus making it less portable
than interpreted code
Compiled object code makes it easier to protect intellectual property as the
machine code is difficult to understand whereas interpreted code can easily
be read and copied by humans
It generally takes longer to run a program under an interpreter than to run the
compiled code because the interpreter must analyse each statement in the
program each time it is executed…
…but it can take less time to interpret it than the total time required to compile
and run it
Compiler generates the error report after the translation of the entire page
while an interpreter will stop the translation after it gets the first error making it
easier to debug
An interpreter uses less memory as source code only has to be present
one line at a time in memory whereas with a compiler all the execution code
needs to be loaded into memory

© UCLES 2015 Page 10 of 10


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/03


Paper 3 Advanced Theory For Examination from 2017
SPECIMEN MARK SCHEME
1 hour 45 minutes

MAXIMUM MARK: 90

This document consists of 13 printed pages and 1 blank page.

© UCLES 2015 [Turn over


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


1(a) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

The television (TV) programme from the studio is converted to digital data/
modulated onto a carrier wave
The TV signal is sent from the studio to a ground/uplink dish station by high
capacity circuit/microwave/fibre optic cable
The signal is uplinked to a geostationary satellite from the ground/uplink dish
station
The frequency/channel of the signal is changed ready for downlinking
The viewer’s dish is in line of sight of the satellite
The signal is sent from the satellite transponder to viewer’s dish
The LNB on the viewer’s dish collects signals from the satellite
A cable downlinks the signal to the receiver box
A satellite decoder/set top box processes signals for use by the TV
1(b) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Satellite TV can be transmitted with higher data rates so the viewer can watch
high-quality audio and video
Satellite TV can be received in most areas so when a terrestrial signal/cable
TV is not available TV can still be watched
The viewer has access to hundreds of channels so can view programmes
from around the world/many TV stations
The viewer has a greater choice of programmes so can select the ones that
are wanted/interesting and discard the channels not wanted
1(c) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

The initial cost to the viewer is higher because the receiver and satellite dish
can be expensive to purchase/install
Viewers will need a separate receiver for each TV set so it can be expensive if
more than one TV set is in use
Poor/bad weather can cause the loss of satellite signals/reception so no
programmes can be watched in very bad weather
Viewers may have to pay extra/subscriptions to watch some programmes

© UCLES 2015 Page 2 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


2(a) Award 1 mark for each correct answer up to a maximum of 8. Award a 8
maximum of 6 marks if the answer contains either all advantages or all
disadvantages.

Eight from:

Advantages:

Observation (by the analyst/Jasbir of the system procedures while they are
being carried out) enables the analyst to witness/see/observe directly/first-
hand how the system actually works and how the users use it
Observation provides a realistic view of the system
The actual methods of working and the procedures can be observed
The observed data are collected in real time and are usually more accurate
than second-hand data

Interviewing is a face-to-face method (used to collect facts directly from


the users of the system being analysed) so there is direct contact between
analyst/Jasbir and interviewee and the analyst/Jasbir/interviewer can ask
specific questions in order to get useful information from the interviewee
Questioning can be flexible so points can be clarified/followed up and
expanded upon
The confidence of the interviewee can be gained and the quality of
information gathered may be increased/enhanced/improved

Documentation reading/research/analysis (is examining existing data,


records, manuals used for the existing system) so the analyst/Jasbir can
obtain actual/real/existing information about the existing system
It is a quick way to gather information compared to the other methods

Using questionnaires made up of a standard set of questions so same/


identical questions are asked of everyone
Can be used to collect information from a large number of users quickly/in
short time
Can be anonymous so answers may vary in truthfulness
Quantitative analysis of the responses can be carried out to produce e.g.
statistics

Disadvantages:

Observation is time-consuming and expensive as the analyst/Jasbir has to do


it in real time
Some procedures/events/problems may not take place at the time of
observation
Direct observation may make the observed person act in a different way than
usual

Interviewing is not suitable for collecting information from a large number of


users of a system
It can be time-consuming and expensive to interview everyone
Interviewees can decline to give useful information/not give all the information
required
Analyst may lack the skills to extract all the information needed from the
interviewee so answers may be inaccurate and contain insufficient information
© UCLES 2015 Page 3 of 14 [Turn over
9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


2(a) Document analysis is unsuitable where there is insufficient/poor quality
documentation
Some documentation expected by analyst/Jasbir may not exist

Questionnaires
The lack of personal contact means that answers cannot easily be clarified
The return rate of the questionnaires may be low
Ambiguous/vague/incomplete/inaccurate answers may invalidate the
responses/information collected
2(b) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

Refer to the objectives/definitions/purposes set out in the design specification


for the new system
Set the schedule/responsibilities for the testing/use of the test plan
Create an appropriate document for stating the tests/recording the test results
... stating the actions to be carried out as a result of the tests
... including columns for tests to be carried out and the extreme/normal/
abnormal test data/to be used
... including columns for the expected results from the test and the actual
results received
Use of alpha testing by potential users at the developers’ site/premises
Use of beta testing by (limited) groups of users at Anderson Chemicals offices
away from/outside of the developer team
Use of white box testing that tests the internal paths through/workings/
structure/of the new system
Use of black box testing that tests the functionality of the new system
Use of compatibility/integration testing to ensure that the new system runs
alongside existing software/hardware at Anderson Chemicals offices
Use of acceptance/installation testing by the potential user in the user’s
environment
2(c) Award 1 mark for each correct answer up to a maximum of 4. 4

Two types from, maximum 2 marks per type:

Adaptive maintenance to allow for changes to the software/hardware of the


system environment
... needed because Anderson Chemicals may have changed the hardware for
the system
... because Anderson Chemicals may have changed/updated other software
that uses/accesses the new system

Corrective maintenance to correct errors/problems found by users


... needed because the program logic may not be what is required/may not
produce correct results

Preventive maintenance to maintain reliability/prevent problems from


occurring
... needed because hardware is to be updated/new peripheral software is to
be installed/network is to be upgraded

© UCLES 2015 Page 4 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


3 Award 1 mark for each correct answer up to a maximum of 6. 6

Six from:

Use of Gantt charts to track the progress of tasks to show the dependency of
tasks on each other
... to show the schedule of work throughout the duration of the project

Use of Project Evaluation and Review Technique (PERT) charts to identify the
specific tasks and their milestones
Creation of arrow/node activity/network diagrams to show how each task is
related
... to determine the expected time required for each task
... to determine the critical path

Use of critical path method to show all activities/parts/tasks of project


... to show the sequence of tasks required and the shortest time these can be
completed
... to show the time duration of each task

Online calendars to schedule meetings with developers


Private and public calendars to inform/invite participants

© UCLES 2015 Page 5 of 14 [Turn over


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


4(a) Award 1 mark for each correct answer up to a maximum of 8. 8

Eight from:

Infrared transmission
Is only effective over short distances so other technologies would be more
effective
Can be blocked by walls/obstacles unlike radio waves
... which further limits the range of effectiveness ...
... but does reduce the risk of eavesdroppers outside the network
Can carry a higher bandwidth compared to radio transmission
Relies on line of sight unlike radio transmission

Fibre optic cable


In the long term a one-off installation cost is cheaper than copper cabling
Many times more bandwidth per cable than a copper cable
Much larger transmission distance than copper cable which is limited to 100
metres and needs switches to relay signals over this distance
Optical cable transmits data up to 100 km resulting in the need for far fewer
network cabinets which means lower cooling costs
Optical cable is immune to external radio frequency or electromagnetic
interference, unlike copper which can pick up interference from a number of
sources along its run that may degrade the speed considerably
Optical cable does not need lightning protection
In the event of a lightning strike or surge will not damage equipment
connected to it
Fibre optic cabling is much lighter than copper, making it easier to transport
and install
Initial cost is highly expensive compared to other methods
Optical cable in a LAN requires special expensive network cards
Fitting optical cable requires special training
If an optical cable breaks, local IT technicians may not be able to repair it
themselves

Point-to-point laser transmission


Faster data transmission/bit rate
Greater bandwidth
Needs receivers/outlets to relay to stations – cannot transmit directly
Relies on line of sight unlike radio wave transmission
Error rates in data transmission are lower than with radio waves
Can be used for quantum key distribution when using quantum key
cryptography unlike radio wave transmission

Radio wave transmission


Can access network resources from any location within the wireless network’s
coverage area or from any WiFi hotspot
Office-based workers are not limited to working at their desks as with a cabled
connection
Wireless networks are more easily expanded with existing equipment, while a
cabled network might require additional wiring
Wireless networks eliminate or reduce wiring costs
Radio transmission does not rely on line of sight unlike some other methods

© UCLES 2015 Page 6 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


4(a) Bluetooth
USB 3.0 interferes with Bluetooth signal
Slowest bit rate of all transmission systems
Obstacles do not affect data transmission/can transmit data through walls
unlike infrared transmission
Range is greater than infrared transmission but lower than cabled or laser
beam
The required processing power of devices is very low
More limited in the number of devices which can be used
4(b) Award a maximum of 2 marks per type of server up to a maximum of three 6
server types.

Six from e.g.:

A file server is a computer responsible for the central storage and


management of data files ...
... so that other computers on the same network can access the files
A file server allows users to share information over a network without having
to physically transfer files by Pen drive/CD-ROM
A file server may be an ordinary PC that handles requests for files and sends
them over the network
A file server can be a dedicated network-attached storage (NAS) device that
also serves as a remote hard disk drive for other computers ...
... allowing anyone on the network to store files on it as if storing files to their
own hard drive

An application server is a computer responsible for the central storage and


management of applications ...
... so that other computers on the same network can access the applications
An application server is a program that handles all application operations
between users and an organization’s backend business applications/
databases
An application server is used for web applications usually performed in the
same running environment as their web server
Many application servers also implement services like clustering, fail-over and
load-balancing

A print server is a software application, network device or computer that


manages print requests in a network
A print server makes printer queue status information available to end users
and network administrators
In a large company a single computer acting as a print server might manage
hundreds of printers
In a small office a print server can be a plug-in board/small network ...
... that frees up valuable disk space on the office’s computers

© UCLES 2015 Page 7 of 14 [Turn over


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


4(b) A mail server handles and delivers email over a network
A mail server can receive emails from client computers and deliver them to
other mail servers
A mail server can also deliver emails to client computers
There are two main types of mail server – outgoing mail servers and incoming
mail servers
Outgoing mail servers are known as SMTP (Simple Mail Transfer Protocol)
servers
Incoming mail servers are usually either POP3(Post Office Protocol v3)
servers or IMAP (Internet Message Access Protocol) servers

A database server is a computer in a network used to store databases and


retrieve information from them
A database server holds the Database Management System (DBMS) and the
databases
It receives requests from the network computers and it searches the database
for the selected records ...
... and passes these records back over the network
A database server usually operates in a client-server network where it
provides information sought by the client computers

A proxy server is a server that acts as a buffer, receiving requests from


clients seeking resources from other servers ...
... such as a file, connection, web page, or other resource available from a
different server
Usually proxy servers facilitate access to content on the World Wide Web
A proxy server can be used to store/cache frequently visited web sites ...
... when the next user on the network visits the same site the page loads from
the proxy server rather than having to search over the internet again ...
... significantly improving access speed for users on the network
A proxy server can be used to control/prevent access to particular websites

A backup server enables the backup of data, files, applications and/or


databases on a network
A backup server provides backup storage and retrieval services to connected
computers, servers or other network devices
A backup server is a server with very large storage capacity
At the scheduled time, the host server connects with the backup server to
initiate the data backup process

A web server stores, processes and delivers web pages to network users
The communication between client and web server takes place using the
Hypertext Transfer Protocol (HTTP)
Web servers most frequently deliver HTML documents which may include
images, style sheets and scripts in addition to text content
A web browser makes a request for a specific resource using HTTP and the
web server responds with the content of that resource or an error message if
unable to do so

© UCLES 2015 Page 8 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


4(c) Award 1 mark for each correct answer up to a maximum of 6. 6

Six from:

Use of encryption key to scramble/make unreadable the data/files/folders


Only users with encryption key can decrypt the data
Encrypting folders/files containing the data to prevent unauthorised access
Use of encrypted connections via network, e.g. SSL, VPNs
Encryption occurs at the network transfer level (layers 3 and 4) of the OSI
model
... using IPsec to create encrypted packets for transmission
Data only encrypted during transmission on network

Question Answer Marks


5(a) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

A storage location
A symbolic identifier
Holds a quantity/value/information
The variable name is used to refer to the stored value
5(b) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Repetition of a process/block of code/statements


In order to meet a wanted result
Results of one iteration used as starting point for the next
5(c) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Repeating a set of instructions/statements


Until a pre-defined condition is met/pre-set number of loops carried out, e.G.
If ... then ... else

© UCLES 2015 Page 9 of 14 [Turn over


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


6 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will analyse in detail a range of positive and a range of negative
implications of the large amount of time spent on social networking sites.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will analyse the positive and negative implications of the large
amount of time spent on social networking sites.
For the most part, the information will be relevant and presented in a
structured and coherent format.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will analyse at least one implication of the large amount of time
spent on social networking sites.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Examples
Answers may refer to or address, e.g.:

Positive implications

Increased interaction between people:


... allows people to keep in touch more regularly
... people living in cities/countries/continents far apart can keep in contact
more easily
... exposing individuals to different cultures
Marketing:
... companies use interactions made over social media to focus on consumers
... customised advertisements allow targeted advertising
Learning:
... children who start using social networking develop communication skills
early on
... becoming more literate
... there is a large amount of information freely available on the internet
News sources:
... news channels ‘tweet’ or give updates on significant news from all over the
world
... availability on social networks means news is more accessible
... news is quickly disseminated around the networks so becoming more
accessible

© UCLES 2015 Page 10 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


6 Negative implications

Reduction in real contact between people:


... less socialising
... reduction in communication skills at individual level
Reduced learning capabilities:
learners become too reliant on social networking sites resulting in loss of
research capabilities
... wastage of time using social networking sites
... results in reduction in academic performance/low grades
... reduced language skills due to use of slang and short word forms
... over reliance on spell checking and grammar check by computers
Loss of motivation/interest in real world:
... too reliant on the virtual world events and loss of practical knowledge of
real world
Health issues:
... affects on mental and physical health
Security of personal and financial data issues:
... collection of and distribution/sale of personal information by websites
... invasion of privacy issues
... misuse of financial data for fraudulent purposes
Advertising issues:
... marketing advertisements aimed at individuals become intrusive
... individuals seen as products by social networking sites

Political impacts may be presented as positive or negative.

Question Answer Marks


7(a) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

More than two participants can take part simulating a face-to-face meeting
All participants can be seen and heard as in a face-to-face meeting
Voice activated switching between participants so they can see and hear who
is contributing
All participants can be seen at once using ‘continuous presence’ technology
Lecture mode allows one participant to be viewed by all the others
Presentations can be viewed by all participants at once
Meetings/conferences can be recorded for later playback/research

© UCLES 2015 Page 11 of 14 [Turn over


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


7(b) Award 1 mark for each correct answer up to a maximum of 6. 6

Six from:

Large documents can be more easily shared and worked on face to face
The discussions of the senior managers/any documents shared would be
more secure/less likely to be hacked in a face-to-face meeting
Video-conferencing can be less personal than meeting face to face and some
meetings need more personal communication ...
... it could be possible to misunderstand body language/meaning when the
image is not clear
Meetings are regular/each week so the video-conference would need to be
set up often which would require technical expertise with recurring costs
Inconvenience for technical staff having to be available/on call for
video-conference each week/on a regular basis
As they are on the same site, the company would not need to pay travel/
accommodation/hotel expenses for face-to-face meetings so video-
conferencing would not be an advantage
As they are on the same site, there is no waste of time travelling to meetings
so video-conferencing would not be an advantage

Question Answer Marks


8(a) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

A padlock is shown by the browser indicating that the data is encrypted during
transmission
The URL will show https indicating that a secure connection is being made
Browser will display a warning if an invalid digital certificate is received from a
website
Browser will display a warning if a mixture of encrypted and unencrypted data
is received from a website
Browser address bar changes colour (to green) when using secure
connections/extended digital certificates
8(b) Award 1 mark for each correct answer up to a maximum of 4. 4

Four from:

Browser initiates a connection to the secure website using https


... using the SSL protocol
Browser uses https to authenticate the website
... by examining the server’s digital certificate and comparing it with that held
by certificating authorities
Browser and web server establish a secure connection using public and
private keys to generate a session key
Transmitted/received data is encrypted using the session key
Browser requests user ID and password from Shafiq
Browser transmits user ID/password in encrypted form to website

© UCLES 2015 Page 12 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017

Question Answer Marks


9(a) Award 1 mark for each correct answer up to a maximum of 2. 2

Two from:

Biometrics include data about facial recognition/iris recognition/retinal


patterns/fingerprints/palm prints stored in computer chips
Biometric data are read at point of access and compared to the stored data
If the data match then access is allowed/if the data do not match access is not
allowed
9(b) Award 1 mark for each correct answer up to a maximum of 8. Award a 8
maximum of 6 marks if all points are in favour or all against. 1 mark can be
awarded for a reasoned conclusion.

Points in favour of the use of biometrics, e.g.:

Biometric identifiers are unique to individuals


... so are more reliable in verifying the identity of an individual
Use of biometrics must be difficult to circumvent/traits must be difficult to
imitate or substitute
... to ensure an appropriate level of security
Using biometrics removes the need for user IDs and passwords
... eliminating problems with forgotten or lost passwords
... eliminating the risk of fraudulent use of another’s login details
Biometric systems have fast matching speeds to deliver accurate results
... so delays in allowing access are minimised

Points against the use of biometrics, e.g.:

All people/everyone must have the trait being used for biometrics so the
biometric data can be compared/measured on everyone
Biometric data must be permanent/does not significantly change over time so
algorithm will work over time
Biometric data must be measurable/must be easy/quick to acquire the data
from an individual so the individual is not inconvenienced/device is accessed
quickly
Biometric data must be in a form that allows processing/extraction of features
for comparison
Biometric data may be passed on to third parties/used for other purposes/
raises concerns regarding privacy and the inappropriate use of the data
... so individuals may not allow use of their data for this purpose/use of
biometrics must be acceptable to participants
There is a limit on the number of stored sets of data/maximum number of sets
of data and this limits the usefulness of biometrics in large populations/with a
large number of users
Biometrics rely on the probability of inputs being valid so if the false
acceptance rate is set incorrectly imposters can be shown as genuine
Failure to detect a match between the input and the (matching) data stored
can result in valid inputs being incorrectly rejected and access being
improperly denied
Failure to capture the biometric data when presented/failing to detect data
when correctly presented results in the rejection of genuine readings and
access is improperly denied

© UCLES 2015 Page 13 of 14


9626/03 Cambridge AS & A Level For Examination
Specimen Mark Scheme from 2017
BLANK PAGE

© UCLES 2015 Page 14 of 14


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 8 2 2 0 8 3 4 5 9 2 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (ST/CGW) 149845/4
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements referring to dynamic and static data.

Dynamic data is data that does not change.

Data that is read from and not written back to a file is called static data.

Data stored on a CD ROM is an example of dynamic data.


Data on a web page that is updated from time to time is an example of dynamic
data.
It is very difficult to add information to a static information source after it has
been created.
There is a limited amount of information in a dynamic information source
compared to a static one.
Dynamic information sources are never checked for accuracy.

A static information source can have information updated quickly.

The data in a static data source is always up to date.


There can be many contributors to a dynamic data source so the information
can be inaccurate.
[4]

2 Tick the four most accurate statements referring to hardware and software.

Compilers and linkers are examples of system software.

Device drivers and interpreters are examples of application software.

Word processing and spreadsheets are examples of hardware.

Software is another name for computer programs.


Software is written in machine code before being converted to high-level
language.
Viruses are a type of software.

Malicious bots are a type of hardware.

System software directly operates the computer hardware.

Operating systems are types of hardware.

A mouse and keyboard are the basic software components of a computer.

[4]

© UCLES 2018 9626/12/M/J/18


3

3 The secretary of a company is transferring workers’ records from paper to a new computer
database. She wishes to make sure the data in the database is accurate. To check the data she is
using verification and validation.

Using an example, or otherwise, explain why she is using validation as well as verification.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/12/M/J/18 [Turn over


4

4 Many personal computers are bought with certain types of software already installed. This includes
a number of items of utility software.

Describe how each of the following utilities carries out its function.

(a) Anti-virus software ....................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Backup software .......................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Disk defragmentation software .................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/12/M/J/18


5

5 Computer controlled traffic lights are used to control traffic flow in major cities.

Identify three input devices which could be used and describe their use in such a system.

Device 1 ...........................................................................................................................................

..........................................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Device 2 ...........................................................................................................................................

..........................................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Device 3 ...........................................................................................................................................

..........................................................................................................................................................

Use ...................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/12/M/J/18 [Turn over


6

6 Many computer users often confuse the terms the ‘internet’ and the ‘World Wide Web’.

Explain what is meant by the term the ‘World Wide Web’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/12/M/J/18


7

7 A managing director of a company supervises other directors. Each director has three departments
they are responsible for. Each department has several workers. The company stores information
about all its workers in a hierarchical database.

Explain what is meant by a hierarchical database management system and describe how such a
system would be used to store the workers’ data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 9626/12/M/J/18 [Turn over


8

8 Here is a spreadsheet showing the prices of various toys in a shop. The discounted price is found
by using a VLOOKUP formula in cells E8:E13.

E8 ✘ fx =D8-(VLOOKUP(C8,$C$3:$D$5,2,FALSE)*D8)
A B C D E F G H
1
2 Discount code
3 A 20%
4 B 15%
5 C 10%
6
7 Toy Price Discounted price Number sold
8 Elephant A $45 $36.00 4
9 Cheetah A $35 $28.00 6
10 Giraffe C $55 $49.50 10
11 Lion B $50 $42.50 5
12 Leopard A $40 $32.00 6
13 Zebra B $30 $25.50 3
14
15
16
17
(a) By describing what the formula in cell E8 does, explain the need for absolute and relative cell
referencing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/12/M/J/18


9

(b) The owner of the shop wants to see which toys have a Discounted price that could be
considered cheap and those that could be considered expensive. He would like to see all the
cells with toys which are more than $40 shaded blue, all those that are less than $30 shaded
yellow and the remainder shaded green.

Describe how this could be achieved without each individual cell having to be changed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(c) The owner wants a chart showing the Number sold of each toy as a proportion of the total
number of toys sold.

Identify the most suitable type of chart which would be used to show this information and
describe how it would be produced.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]
© UCLES 2018 9626/12/M/J/18 [Turn over
10

9 A medical centre uses expert systems to help diagnose illnesses.

Explain how the components of an expert system would be used to produce the diagnosis of an
illness.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/12/M/J/18


11

10 A car salesroom has a relational database which stores details of the cars and the customers
who have purchased a car. The manager uses it to search for information about the cars and the
customers. She also produces reports based on these searches.

Tables
Queries
Customers second names beginning with

Price of car
Forms
Customers
Reports
All cars in stock

Price less than $20000

(a) She wants to have an easier way of accessing the queries, forms and reports.

Design a switchboard for her which will allow her to go to any of the reports, forms or queries
already set up as shown in the image above.

[4]

© UCLES 2018 9626/12/M/J/18 [Turn over


12

(b) Referring to any four interactive items on your switchboard explain what will happen if they
are selected.

Item 1 ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Item 2 ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Item 3 ........................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

Item 4 ........................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(c) Below is a diagram showing the tables in the database.

Cars Orders Customers

Car–Code ID Customer–code
Make Order–No First Name
Model Customer–code Second Name
Price Car–Code Address–1
Address–1

The car salesroom manager wanted a list of cars made by Frod as well as, in the same list,
any cars ordered by customers whose second name begins with B.
The printout shows the makes and models of cars, first and second customer names who
have ordered them and the order number.

Make Model First Name Second Name Order_No


Frod Deomon Alan Sutton 9
Frod Deomon Bruce Silversmith 8
Frod Deomon Johann Schmidt 5
Frod Deomon Brian Biggins 3
Olap Azum George Babak 10
Yatoya Yangtse Kulvir Bains 7

© UCLES 2018 9626/12/M/J/18


13

Describe, in detail, the steps required to set up a query which would display this list.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/12/M/J/18 [Turn over


14

11 Many major supermarkets now use a variety of monitoring technologies to check the work of their
employees.

Evaluate the use of technology to monitor employees in the workplace.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/12/M/J/18


15

12 Financial models are often created using spreadsheet software rather than using manual
methods.

Evaluate the use of spreadsheet models for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/12/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/12/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 6 5 1 6 9 9 0 8 9 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SW) 149773/4
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements referring to hardware and software.

Operating systems are examples of hardware.


An Optical Mark Reader and a Magnetic Ink Character Reader are types of storage
device.
A scanner is a type of software.

Hardware is another name for the physical parts of a computer system.

A bar code reader is an example of an input device.

The CPU of a computer is considered to be hardware.

A device driver is a type of hardware.

System and application are the names of two types of software.

A dot matrix printer is an example of software.

Applets and apps are examples of hardware.


[4]

2 Tick the four most accurate statements referring to protecting the confidentiality of personal data.

You should use different passwords and PINs for different accounts.
Storing personal data on removable media only and locking them away when not in
use, is a good form of protection.
Encryption prevents data from being accessed.

A firewall always prevents unauthorised users from accessing confidential data.

Installing spyware helps protect confidential data from unauthorised access.

Banks are allowed to share personal data of customers with other customers.
Confidential personal data is usually stored on DVD ROMs as this prevents it from
being accessed.
TLS is a cryptographic protocol used to protect personal data transmitted across a
network.
Users should always log off immediately after using a site where personal data has
been typed in.
Using public computers to access personal information is good practice as they
usually have plenty of security.
[4]

© UCLES 2018 9626/13/M/J/18


3

3 When data is entered into a database it needs to be checked for accuracy. One of the methods
used to help in this process is verification.

Compare and contrast the different methods used to carry out verification.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2018 9626/13/M/J/18 [Turn over


4

4 Jasmine is carrying out a study of the effect of pollution on her local countryside. She intends to
use data from direct data sources as well as indirect data sources.

Describe what is meant by direct and indirect data sources using examples from this scenario.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/13/M/J/18


5

5 Joseph has written a program using a high level language. He now needs to get it translated for
use on his computer.

Compare and contrast the use of a compiler with an interpreter for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/13/M/J/18 [Turn over


6

6 A number of schools in the Americas have introduced a BYOD (Bring Your Own Device) policy.
This means that students are expected to bring their own device to school for use in lessons. This
can encourage a digital divide within schools.

(a) Describe three ways in which this can widen the digital divide within schools.

1. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3. ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe three ways in which this situation could be rectified.

1. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2. ...............................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3. ...............................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/13/M/J/18


7

7
A B C D E F G H
1
2
3
4
5 11
6 7
7 4 6 9 15 5
8 6
9 8
10
11
12
13
Values Formulae Functions

Using examples from the spreadsheet above, describe in detail:

(a) Cells

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Rows

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Columns

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(d) Worksheets

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 9626/13/M/J/18 [Turn over


8

8 Here is a section of a database showing the wages paid and hours worked by some workers in a
company.
New data is about to be entered but it will need to be validated. Validation rules will need to
be created to make sure the data is sensible. Two validation rules would be appropriate for the
Telephone field and one for the Weekly wage field. You can assume the wages shown include
the minimum and maximum that the company pays.

J215VENUES
Family name First name Telephone Weekly wage Hours worked
Smith John 01632 267145 220 47
Prudhomme Pierre 01632 342016 250 51
Gonzales Jose 01632 941368 260 42
Signusson Lars 01632 643821 240 40
Thorsvald Olaf 01632 811276 190 45
Mueller Dieter 01632 351156 180 48
Lucio Silvio 01632 281146 210 43
Boko Peter 01632 444707 260 51
Ndlovu Joseph 01632 319249 300 41
James Peter 01632 860787 310 40
Gordon James 01632 205775 280 40
McDonnell Jamie 01632 430332 250 45
Kelly Peter 01632 832287 290 50

Describe, using examples from the data shown, the validation rules that will be created. For each
one, give examples of test data (do not include normal data) that would test the validation rule
works and give reasons for each choice.

(a) Telephone:

(i) Validation rule 1 .................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Test data ............................................................................................................................

...........................................................................................................................................

Reason ..............................................................................................................................

...................................................................................................................................... [2]

(iii) Validation rule 2 .................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

© UCLES 2018 9626/13/M/J/18


9

(iv) Test data ............................................................................................................................

...........................................................................................................................................

Reason ..............................................................................................................................

...................................................................................................................................... [2]

(b) Weekly wage:

(i) Validation rule ....................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [2]

(ii) Test data ............................................................................................................................

...........................................................................................................................................

Reason ..............................................................................................................................

...................................................................................................................................... [2]

(c) Select an appropriate data type for the Telephone field, explaining why you have chosen it.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/13/M/J/18 [Turn over


10

(d) The data from this section of the database has been imported into a spreadsheet. This is
because the manager wants to calculate the average wage earned by the workers who work
more than 40 hours a week but less than 50 hours a week.

A B C D E F
1 Family name First name Telephone Weekly wage Hours worked
2 Smith John 01632 267145 220 47
3 Prudhomme Pierre 01632 342016 250 51
4 Gonzales Jose 01632 941368 260 42
5 Signusson Lars 01632 643821 240 40
6 Thorsvald Olaf 01632 811276 190 45
7 Mueller Dieter 01632 351156 180 48
8 Lucio Silvio 01632 281146 210 43
9 Boko Peter 01632 444707 260 51
10 Ndlovu Joseph 01632 319249 300 41
11 James Peter 01632 860787 310 40
12 Gordon James 01632 205775 280 40
13 McDonnell Jamie 01632 430332 250 45
14 Kelly Peter 01632 832287 290 50
15
16 Average 230
17

Write down the formula which should go in cell D16.

= ................................................................................................................................................

.............................................................................................................................................. [6]

You may use the space below for any working out.

© UCLES 2018 9626/13/M/J/18


11

(e) Describe how the spreadsheet could be sorted so that Dieter Mueller is the first worker in the
list and Pierre Prudhomme is the seventh.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(f) The manager has decided that the name fields should be combined. He wants a name field
containing the first name initial and the family name. Write down the formula that would give
Jamie McDonnell’s name as J McDonnell.

= ................................................................................................................................................

.............................................................................................................................................. [3]

You may use the space below for any working out.

© UCLES 2018 9626/13/M/J/18 [Turn over


12

9 Some database systems use the indexed sequential method of accessing data.

Describe the features of indexed sequential access and how it is used.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/13/M/J/18


13

10 Magnetic Ink Character Recognition (MICR) and Optical Character Recognition (OCR) are often
used in different ways for different purposes.

Evaluate the use of MICR and OCR for entering data from documents.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/13/M/J/18 [Turn over


14

11 Many people use their mobile phones for internet access.

Discuss the advantages and disadvantages of mobile networks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/13/M/J/18


15

BLANK PAGE

© UCLES 2018 9626/13/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/13/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 2 2 8 5 0 0 9 2 5 5 *

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (SC/SG) 152977/2
© UCLES 2018 [Turn over
2

1 A company stores details of its customers in a database which is to be used as the source file for
a mail merge. A letter, created as the master document, is to be sent to all the customers by post
or by email. The company prefers to send the letter by email. However, letters will be sent by post
if the company does not have a current email address for the customer in its database.

Describe how a mail merge field in the master document can be set up to exclude those customers
whose email address is not stored in the database.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/31/M/J/18


3

2 JavaScript defines a number of primitive data types.

(a) Explain the term ‘primitive’ when used in this context.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Describe three primitive data types used in JavaScript.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9626/31/M/J/18 [Turn over


4

3 Variables are used in JavaScript to hold values.

Explain how a variable is created in JavaScript code.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/31/M/J/18


5

4 As part of a project to create a new software application, a system analyst will produce a software
requirements specification and a user requirements specification.

(a) Describe the contents of a software requirements specification for the new software
application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe the purpose of a user requirements specification for the new software application.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(c) Give one reason why the user requirements specification might prove to be inaccurate.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9626/31/M/J/18 [Turn over


6

5 Discuss the benefits and drawbacks of the use of satellite technology in global positioning systems
(GPS).

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/31/M/J/18


7

6 Tamsin is evaluating CPU hardware for use in a new tablet computer. She uses the charts in
Fig. 1 to help her make a decision between using CPU 1 or CPU 2 in the new tablet.

Time taken to run a JavaScript Performance tests


benchmark test

CPU 1 Physics
CPU 1
calculations
test

CPU 2 Graphics
performance
CPU 2
0 2 4 6 8 10 12 14 16
Time in seconds
0 5 10 15
Score (points)

Fig. 1

Identify, with reasons based on the information in Fig. 1, the most suitable CPU for Tamsin to use
in the new tablet computer.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 9626/31/M/J/18 [Turn over


8

7 Cynthia has created a database to store details of her friends in the UK and wants to include
their home addresses. She will create a validation routine to check that the UK postcode of their
address is in a valid format when it is entered into the database.

UK postcodes must have an outward code and an inward code separated by a single space. The
outward code is made up of the postal area and the postal district. The inward code also has two
parts: the postal sector and the postal unit. A typical UK postcode is CB1 2EU.

The whole postcode conforms to a format as shown by the examples in Fig. 2.

UK Postcode Formats
Outward Code Inward Code
Area District Sector Unit Written as:
Example 1: CB 1 2 EU CB1 2EU
Example 2: SW 1A 1 AA SW1A 1AA
Example 3: SW 1A 0 AA SW1A 0AA
Example 4: CV 4 8 JQ CV4 8JQ

Fig. 2

Using the information given above, describe what the validation routine would have to do in order
to check that the entered postcode was in a valid format.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/31/M/J/18


9

8 Discuss the advantages and disadvantages of carrying out research into an existing computerised
stock control system using the analysis of existing documents.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/31/M/J/18 [Turn over


10

9 A graphics artist has drawn a shape on a 600 × 800 pixel resolution grid as shown in Fig. 3.

600

500

400

Y 300

200

100

0
0 100 200 300 400 500 600 700 800
X

Fig. 3

The shape is to be stored in a computer file as a vector graphic so that it can be opened and
displayed in different resolutions without loss of quality.

Describe the information about the shape that would be stored in the vector graphic file.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/31/M/J/18


11

10 A large school is creating a relational database to store details of pupils and teachers. Examples
of the data to be stored are shown:

Pupils: Orlando Albert Sockett Teachers: Christopher Wallace


Born: 22 October 1999 Based in Room 27
Studies: English, Mathematics, Science Teaches English

Using the information given, create a data dictionary in the table to list the entities and attributes of
the new database:

Entity Attribute Data type Field size

[8]

© UCLES 2018 9626/31/M/J/18 [Turn over


12

11 An automatic washing machine has a number of wash cycles controlled by an embedded computer
system. The system can accept inputs to vary the temperature and spin speed. It also has ‘start’
and ‘stop/cancel’ buttons.

When the ‘start’ button is pressed the system checks, in this order:
• that the door is properly closed
• the temperature has been set by the user
• the spin speed has been set by the user
• if the load is either a ‘full load’ or ‘half load’ of washing.

The washing cycle will automatically stop if the set time has been reached or the ‘stop/cancel’
cycle button is pressed.

A section of the control sequence is shown in the flowchart in Fig. 4. Some flowchart labels are
missing.

Door is closed.
Temperature &
Spin Speed are
input
No No No

START
Yes Yes
button is A B C
pressed

Yes

Full or Half
load setting
is input
STOP washing
machine cycle
Yes Yes
START
No
E D washing
machine cycle

No

Fig. 4

© UCLES 2018 9626/31/M/J/18


13

Complete the table below to describe how the embedded computer system controls the washing
machine at A, B, C, D and E.

Position in
What is happening at the position
flowchart

[5]

© UCLES 2018 9626/31/M/J/18 [Turn over


14

12 The networking of computers can give rise to a variety of issues.

Describe each of the following security issues and suggest how, other than using physical security
methods, the risk from each may be reduced.

(a) DNS spoofing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) DoS attack.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/31/M/J/18


15

(c) ARP spoofing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

PLEASE TURN OVER FOR QUESTION 13.

© UCLES 2018 9626/31/M/J/18 [Turn over


16

13 Companies use a range of physical security methods to try to prevent unauthorised access to the
company data stored on their networks.

Evaluate the use of physical security methods in attempting to prevent unauthorised access to the
stored data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/31/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 3 0 1 0 0 1 1 8 2 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SG) 152978/2
© UCLES 2018 [Turn over
2

1 An online store requires customers to create an account using its website. The online form for
creating the account, with customer entries, is shown in Fig. 1.

Create a Customer Account

Note that all fields marked with * are required.

Your first name* Jasmine

Your family name* Singh

Valid email address* jasmine@singh.me Please enter a valid email ID

Confirm email address* jasmine@singh.me Please re-enter your email ID

Password* ***********
Confirm password* ***********

Security question* Mother’s first name Please select a question

Enter the answer* Jaswinder Enter a keyword for the answer

Gender Male Female

Date of birth (DoB)* 11 10 2002


Please enter your DoB as month day year

I agree to the Terms and Conditions and to the Privacy Policy*

Please check the box to show that you have read and agree to the terms. 

Fig. 1

© UCLES 2018 9626/32/M/J/18


3

The data entered by the customer is checked for accuracy before it is submitted to the website.

(a) Describe, using the information shown in Fig. 1, how the data in the required fields (fields
marked *) on the form could be checked.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

(b) Describe one essential element that must be added to the form.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9626/32/M/J/18 [Turn over


4

2 Holographic imaging is an emerging technology.

Describe how holographic imaging could be used in the field of medicine.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18


5

3 A store has a large number of departments each with its own sales staff. The sales staff are
responsible for selling only the goods in their department. Each department has its own dedicated
checkouts which are connected to the store’s network.

A new checkout system is to be implemented so that the staff in the clothing department can use
any of the checkouts in the store to sell goods. Staff with experience of the new system will be
expected to assist in the training of staff in other departments when the new system is eventually
introduced throughout the store.

The store managers have to decide how to implement the new sales and checkout system.

Describe the most appropriate method of implementation and explain how the change would be
carried out in the store.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18 [Turn over


6

4 ‘Loops’ are used in JavaScript to execute a block of code several times.

The following code shows a ‘for’ loop and the code for displaying the result.

<p id="Number"></p>

<script>
//JavaScript code follows
var displayresult = "";
var X;

for (X = 1; X < 10; X += 3) {


displayresult += X + "<br>";
}
//the following line displays the contents of ‘displayresult’ on the
webpage
document.getElementById("Number").innerHTML = displayresult;
</script>

(a) Describe what each statement in the ‘for’ loop does and the results that are output when the
code is executed.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/32/M/J/18


7

(b) Rewrite the ‘loop’ code as a DO WHILE loop to display the same results.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(c) The JavaScript code is deemed to be ‘client-side’ code.

Explain why the use of ‘client-side’ code can cause problems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9626/32/M/J/18 [Turn over


8

5 A company sells replacement windows for customers’ homes. A salesman visits customers’
homes to measure the windows. The salesman usually takes a company laptop on the visit. The
salesman is away from the office most of the day. When the salesman is back in the office he has
to type up a report on the visit and create quotations to send to the customers. He needs access
to a variety of documents including those found on the internet. The salesman also needs to be
able to communicate with customers in a variety of ways.

The company managers are considering replacing the laptop with a new smartphone for the
salesman to take on the visit.

The salesman has made a comparison of the two devices.

Explain why the salesman has told the company managers that both devices are needed for the
visits.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18


9

6 A software company is developing a new ‘app’ for smartphones. The Rapid Application
Development (RAD) method is used to ensure that the ‘app’ is available as soon as possible.

(a) The RAD process involves several phases. The first phase is often referred to as Business
Modelling.

Describe the tasks that must occur in this phase of RAD.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9626/32/M/J/18 [Turn over


10

(b) Describe two other phases of RAD.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9626/32/M/J/18


11

7 Telecommunication companies often prefer to use fibre optic cables to transmit data.

Discuss the benefits and drawbacks of using fibre optic cables for data transmission.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18 [Turn over


12

8 (a) Explain what is meant by digital currency.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Evaluate the impact of digital currencies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18


13

9 Describe the impact of video-conferencing on learning in schools.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18 [Turn over


14

10 Discuss the advantages and disadvantages of software-based training methods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/M/J/18


15

BLANK PAGE

© UCLES 2018 9626/32/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/32/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 2 4 9 8 4 5 5 6 5 5 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (SC/SG) 152979/2
© UCLES 2018 [Turn over
2

1 Video is streamed over networks and the internet at different bit rates. Fig. 1 shows a summary of
the bit rates that are usually required for various video resolutions. Fig. 2 shows the bandwidths
that are typically available over different mobile (cell) phone connections.

Output video Bit rate Type of mobile Typical maximum


resolution (Mbits/s) connection to bandwidth available
(pixels) network/internet for download (Mbits/s)
320 × 240 0.4
480 × 270 0.7 3G mobile connection 0.31
1024 × 576 1.5 4G mobile connection 15
1280 × 720 2.5 Bluetooth® 1.1
0.5
connection
1920 × 1080 4.0
Wi-Fi
(IEEE 802.1g) wireless 54
connection

Fig. 1 Fig. 2

Using all the information in Fig. 1 and Fig. 2, explain how the viewing experience of a streamed
video displayed on a mobile (cell) phone screen of resolution 1024 × 576 pixels is affected by bit
rate and available bandwidth.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2018 9626/33/M/J/18


3

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/M/J/18 [Turn over


4

2 The use of JavaScript within the HTML code of a web page allows the page to react to user
intervention.
The code below contains a function named checkreadpagefunction that will ask the user to
confirm that the page has been read.

Complete the JavaScript code by writing extra code that will capture the click event and execute
the function.

<html>
<body>
<p>Click on the button to confirm that you have read this page.</p>
<button id="button1">Click here</button>
<script>

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

function checkreadpagefunction() {
alert ("I have read this page.");
}
</script>
</body>
</html>

You may use the space below for any rough work.

© UCLES 2018 9626/33/M/J/18


5

3 Fig. 3 shows a switched network with computers at A, B, C and D.


S1, S2, S3, S4, S5 and S6 are switches. A message is being sent between computers at A and B.
The whole message is sent at once along the route shown by the arrows.

A S1 S4 B
Message Source Message Destination

S3 S6
C D
S2 S5
Network of switches

Fig. 3

(a) Explain, with reference to Fig. 3, why this method of sending a message by the route shown
is often called ‘store and forward’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]
© UCLES 2018 9626/33/M/J/18 [Turn over
6

(b) Describe two advantages of using the ‘store and forward’ method to send a message over
this network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/33/M/J/18


7

4 An animator used a computer to produce an animation consisting of eight frames. The frames are
shown in Fig. 4.

1 2 3 4 5 6 7 8

Fig. 4

The animator only drew some of the frames in this animation and the computer created the others.

Explain how the sequence of frames was created.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/M/J/18 [Turn over


8

5 RockICT Sales sells hats to customers direct from its warehouse. It has a centralised ordering
system that is linked to the warehouse and accounts systems. When a customer orders a hat, the
system:

• takes the orders from the customer


• checks the stock status with the warehouse
• sends messages to the customer advising of the status of the order
• sends out a request for payment and processes the payment
• requests the shipping of the hat from the warehouse
• receives a shipping confirmation and a stock inventory update from the warehouse
• sends stock inventory and payment updates to the accounts.

Draw a Level 0 (context level) Data Flow Diagram of the system to show the external entities and
the data flow between these and the ordering system. The ordering system has been drawn in the
centre of this box for you.

Ordering
System

[8]

© UCLES 2018 9626/33/M/J/18


9

6 (a) Describe how a bitmap (‘raster’) graphic is stored in a computer file.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Vector images are stored in computer files in a different format to how bitmap (‘raster’) images
are stored.

Explain why vector images must be converted to bitmap (‘raster’) images for display on a
digital monitor.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9626/33/M/J/18 [Turn over


10

7 Describe how holographic optical disk storage technology uses lasers to store vast amounts of
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/M/J/18


11

8 Describe the benefits to workers of teleworking.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/M/J/18 [Turn over


12

9 (a) Describe how vision enhancement technology can assist visually impaired people when
walking around a shopping street.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Describe two other uses of vision enhancement technology.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/33/M/J/18


13

10 Consuela is organising the building of her new house.

Discuss the advantages and disadvantages of the various types of project management software
for this task.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/M/J/18 [Turn over


14

11 Discuss the benefits and drawbacks of using satellites for television and radio broadcasting.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/M/J/18


15

12 Evaluate the impact of e-business on society.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/33/M/J/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 7 5 7 4 1 5 1 5 2 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (SC/SW) 149846/4
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements referring to the meaning of data and information.

Data consists of raw facts and figures.

Information when processed becomes data.

Data is a collection of text, numbers, symbols, images or sound.

Data does not need to have meaning to become information.


Knowing that 159.5, 164.3, 162.9 and 172.3 are the heights in centimetres of
pupils in a school makes it a set of data.
Data cannot be interpreted until it is organised.

Data is never represented by binary in a computer.

Data must have a context to become information.

Data is the result of processing information, usually by computer.

A group of facts which are used in context is called a set of data.


[4]

2 Tick the four most accurate statements referring to different types of user interface.

A mouse is essential for entering commands when using a command line


interface.
Computer beginners often prefer to use a command line interface.
A graphical user interface does not require the user to learn many commands off
by heart.
Users can only draw charts when using a graphical user interface.

A graphical user interface consists of windows, icons, menus and pointers.

A microphone is needed to input commands into a dialogue interface.

A dialogue interface requires the user to be a computer expert.

A gesture based interface does not require the use of any input devices.

A gesture based interface usually concentrates on face and hand movements.


The time taken for a command to be given and the response appearing on the
screen is not important in a dialogue based interface.
[4]

© UCLES 2018 9626/11/M/J/18


3

3 An author is using a computer to write a book.

(a) Describe, in detail, how she could use different sets of keys on her keyboard to edit and save
the book.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) When the author finishes a chapter she wishes to print it out.

Name three appropriate types of printer, and for each one give a different advantage to the
author for using it compared to the others.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/11/M/J/18 [Turn over


4

4 There is a global digital divide between more and less industrially developed nations.

Describe this type of digital divide.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/11/M/J/18


5

5 People working away from their office are able to make use of their company’s network through
a VPN.

Explain what is meant by a VPN.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/11/M/J/18 [Turn over


6

6 Many organisations use expert systems as a diagnostic tool.

Describe, in detail, the components of an expert system.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/11/M/J/18


7

7 Describe the importance of considering a user’s mental model when a designer seeks to create a
user interface for them.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/11/M/J/18 [Turn over


8

8 Juan is the owner of a small company. He has created a spreadsheet to calculate the payroll.
His spreadsheet is shown below.

Each worker pays one of four different rates of tax.

Each worker has one of four different tax allowances. A tax allowance is the amount that can be
earned before workers start paying tax.

A B C D E F G H I J
1 Range of tax rates Tax allowance range
2
3 A 20% W X Y Z
4 B 30% 200 220 240 260
5 C 35%
6 D 40%
7
8
Wage after
Weekly Tax Taxable tax
9 Worker’s name wage Tax rate allowance pay deduction
10
11 Patrick O’Reilly 250 B Y 10 $247
12 John McDonnell 300 D Z 40 $284
13 Louise Gimenez 280 A X 60 $268
14 Jeanette Grimault 260 A Y 20 $256
15 Xavier Hernandes 250 C W 50 $233
16 Paolo Riva 240 B W 40 $228
17 David Kennedy 280 D Z 20 $272
18 Sian Evans 270 A Y 30 $264
19 Karl Gustaffson 260 B W 60 $242
20

(a) To make it easier to do the calculations Juan has used named ranges. The Range of tax rates
is called Rate and the Tax allowance range is called Allowance.

Describe how you would set up the named range Allowance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/11/M/J/18


9

(b) Each worker has an amount, related to their Tax allowance, deducted from their weekly wage
to calculate the Taxable pay.

Write down the formula that should go in cell F11 to calculate the Taxable pay for Patrick
O’Reilly. The formula should be easy to replicate and use a named range.

= ................................................................................................................................................

.............................................................................................................................................. [4]

You can use the space below for any working you need.

(c) The Taxable pay is multiplied by the rate of tax to calculate the tax which must be paid, which
is then deducted from their Weekly wage. The result will be their Wage after tax deduction.

Write down the formula that should go in cell G11 to calculate the Wage after tax deduction.
The formula should be easy to replicate and use a named range. Identify the steps which
need to be taken to display the value in G11 exactly as shown in the spreadsheet.

= ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [7]

You can use the space below for any working you need.

© UCLES 2018 9626/11/M/J/18 [Turn over


10

9 A company has its own website and wishes to add a music soundtrack. Its web designers will
need to edit the soundtrack before uploading it. They will need to use sound editing software.

Describe, including their effects, the following aspects of sound editing software.

(a) Sampling rate ...........................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(b) Sampling resolution ..................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

(c) Trimming ...................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [2]

© UCLES 2018 9626/11/M/J/18


11

10 Below is an excerpt from a database showing some holiday bookings.

Country Group size Code Discount Duration


Egypt 4 EGY 10
Malaysia 5 MAL 14
Thailand 8 THA 7
Costa Rica 4 COZ 10
Sri Lanka 2 SRI 14
Bahamas 3 BAH 21
Indonesia 4 IND 14
Indonesia 4 IND 10
Costa Rica 5 COZ 14
Egypt 6 EGY 14
Sri Lanka 4 SRI 21
Egypt 8 EGY 7
Thailand 5 THA 7
Costa Rica 4 COZ 14
Costa Rica 2 COZ 7
Indonesia 2 IND 14
Malaysia 5 MAL 14
Thailand 2 THA 14
Sri Lanka 6 SRI 14
Thailand 3 THA 14
Egypt 4 EGY 14
Malaysia 2 MAL 7
Indonesia 2 IND 14
Malaysia 4 MAL 10
Bahamas 4 BAH 7
Costa Rica 4 COZ 14
Thailand 5 THA 14
Sri Lanka 6 SRI 10
Thailand 8 THA 7
Thailand 4 THA 14
Egypt 4 EGY 7
Egypt 2 EGY 14

(a) (i) Describe the steps that need to be followed to set up a dynamic query to allow you to
search on the Group size and Code fields. All fields are to be printed except Discount.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...................................................................................................................................... [5]

© UCLES 2018 9626/11/M/J/18 [Turn over


12

(ii) You run the query and type in the Group size as 4 and the Code as EGY.

Write down the Durations that will be printed out.

...........................................................................................................................................

...................................................................................................................................... [2]

(b) The Duration field has only the values shown in the database excerpt. The database needs to
be set up to allow you to enter the data in this field without using the keyboard to type in the
value each time.

Describe how this would be done and explain how you would now enter the data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

© UCLES 2018 9626/11/M/J/18


13

(c) When the database was initially set up it did not have the Country field. Data was exported to
a spreadsheet and a formula created, using the Code field, to add the names of the countries
with the layout exactly as shown in the database excerpt.

Without specifying the formula precisely, explain how this could be achieved.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [5]

© UCLES 2018 9626/11/M/J/18 [Turn over


14

11 Control technologies are affecting everybody in their normal way of life. Some people think this is
good; others disagree with this.

Evaluate the use of control technologies in everyday life.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/11/M/J/18


15

12 Many people use the internet on a daily basis to communicate with others.

Discuss the benefits and drawbacks of individuals using the internet to communicate with each
other.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/11/M/J/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/11/M/J/18


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 9 printed pages.

© UCLES 2018 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 Operating systems are examples of hardware. 4

An Optical Mark Reader and a Magnetic Ink Character Reader are


types of storage device.
A scanner is a type of software.
Hardware is another name for the physical parts of a computer 3
system.
A bar code reader is an example of an input device. 3
The CPU of a computer is considered to be hardware. 3
A device driver is a type of hardware.
System and application are the names of two types of software. 3
A dot matrix printer is an example of software.
Applets and apps are examples of hardware.

Question Answer Marks

2 You should use different passwords and PINs for different accounts. 3 4

Storing personal data on removable media only and locking them 3


away when not in use, is a good form of protection.
Encryption prevents data from being accessed.
A firewall always prevents unauthorised users from accessing
confidential data.
Installing spyware helps protect confidential data from unauthorised
access.
Banks are allowed to share personal data of customers with other
customers.
Confidential personal data is usually stored on DVD ROMs as this
prevents it from being accessed.
TLS is a cryptographic protocol used to protect personal data 3
transmitted across a network.
Users should always log off immediately after using a site where 3
personal data has been typed in.
Using public computers to access personal information is good
practice as they usually have plenty of security.

© UCLES 2018 Page 3 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

3 Five from: 5

Both involve comparing data that has been/is being entered with another copy
Both involve checking that data has been entered correctly not that it is correct
Visual verification is visually checking the entered data against the source
document
Double data entry is usually two people entering the data/entered (by the same
person) twice (and each version compared against the other)
Visual verification is carried out by a human/user/yourself
Double data entry – verification is carried out by the computer
Visual verification will enable the user to see mistakes if they have been made
With double data entry the computer will alert user to the fact that a mistake
has been made and they decide which version has been copied correctly.

Question Answer Marks

4 Six from: 6

A direct data source is a source where data is collected for a specific purpose
or task
Examples of direct data sources are questionnaires or data logging
An indirect data source is when data is obtained from a third party not
necessarily related to the current task

Direct data source


It gives us data that is often called ‘original source data’
Questionnaires could be distributed amongst farmers and local people asking
about the effects of pollution
Interviews could be carried out with farmers and local people asking about the
effects of pollution
Data logging – sensors could be used to gather pollution data that could be
processed and interpreted

Indirect data source


Means data that was collected for a particular reason but is then used for
another purpose
Could collect data from local government agencies which may have pollution
data for the local area
Could collect data from local environment groups.

© UCLES 2018 Page 4 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5 Six from: 6

Compiler and interpreter both convert high level programming language to a


lower level
Both are examples of system software

A compiler converts the high-level instructions into machine language


An interpreter converts the high-level instruction into some intermediate form
and after that the instruction is executed

The entire program is compiled before being executed


The interpreter translates one statement at a time, executing the statement
before moving on to the next one

A list of errors is created by the compiler after the compilation process


An interpreter stops translating after the first error

When executed, the compiled program is executed directly using the machine
code
An interpreter has to be resident in memory in order for the program to run

Interpreted programs can be modified at runtime by adding/changing functions


A compiled program has to be recompiled fully even for small modifications to
be made.

Question Answer Marks

6(a) Three from: 3

Students whose families can afford the devices have an unfair advantage
Teachers find it difficult to manage learning activities when they have to
support multiple platforms and device types
Some activities and applications may only be compatible with certain devices
The gap widens as underprivileged students lack access to high performance
computers at home
Underprivileged students do not have internet access at home so they do not
learn the same things putting them at a distinct disadvantage.

6(b) Three from: 3

Teachers could be given time to train on and understand the platforms they are
using
Teachers could have to learn how to integrate them into a class of students
who may not have access to the internet or mobile devices at home
Schools need to have different versions of software that can be used on all
devices
Libraries and schools should offer technology training for parents
A fund for the purchase or subsidy to purchase machines for poor children
A stock of spare machines kept in school in case students do not have
machines
A list of software could be issued to staff which runs across all platforms.

© UCLES 2018 Page 5 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7(a) Two from: 2

A cell is a specific location within a spreadsheet and is defined by the


intersection of a row and column
Cells are often referenced by a letter and number combination
For example, C6 is the cell containing the value 7.

Must have an example to gain both marks.

7(b) Two from: 2

Rows run horizontally in a worksheet


Each row is identified by a number in the row header
Row 7 is highlighted in the spreadsheet/contains the values 4, 6, 9, 15, 5.

Must have an example to gain both marks.

7(c) Two from: 2

Columns run vertically in a spreadsheet


Each column is identified by a letter in the column header
Column C is highlighted in the spreadsheet/contains the values 11, 7, 9, 6, 8.

Must have an example to gain both marks.

7(d) Two from: 2

A worksheet or sheet is a single page in a spreadsheet


Each worksheet has a name and by default the worksheets are named Sheet1,
Sheet2 and Sheet3
In this example they are named Values, Formulae and Functions.

Must have an example to gain both marks.

Question Answer Marks

8(a) Telephone:

8(a)(i) Validation rule 1

Length check 1

to check that phone number is exactly 12 characters. 1

8(a)(ii) Test Data e.g. 01632 27564, 01632 2756422 1

Reason these are examples of data less than 12 characters and more than 1
12 characters.

© UCLES 2018 Page 6 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(a)(iii) Validation rule 2

Format check 1

to check that each phone number has 5 characters, a space followed by 6 1


characters.

8(a)(iv) Test Data e.g. 0163 256667, 016322 27655, 01632348976, 01632 454631 1

Reason any valid reason matching data chosen. 1

8(b) Weekly wage:

8(b)(i) Validation rule

Range check 1

to check is not lower than 180 and not more than 310 1

8(b)(ii) Test Data any example of extreme and abnormal data 1

Reason abnormal is outside the range and should trigger an error 1


message. Extreme is on the edge of the range but should be
accepted.

8(c) Text

There is a space in between the digits 1

There is a leading zero 1

No calculations would be needed on the field. 1

8(d) =AVERAGEIFS(D2:D14,E2:E14,">40",E2:E14,"<50") 6

=AVERAGEIFS() – 1 mark
(D2:D14, – 1 mark
First E2:E14, – 1 mark
“>40”, immediately after E2:E14 – 1 mark
Second E2:E14, – 1 mark
“<50” immediately after E2:E14 – 1 mark

8(e) Three from: 3

Select A2:E14
Sort in ascending order of column D
Add a level
Sort in ascending order of column E/column B/column A.

Must be in this order.

© UCLES 2018 Page 7 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(f) =CONCATENATE(LEFT(B13,1),” “,A13) 3

=CONCATENATE() – 1 mark
LEFT(B13,1), – 1 mark
,” “,A13 – 1 mark

Question Answer Marks

9 Eight from: 8

Allows records to be accessed either sequentially in the order they were


entered or randomly using an index
Each index defines a different ordering of the records
A database may have several indexes, based on the information required
A key is specified in each index
It is a method of indexing data for fast retrieval
Data is organised into records which consist of fixed length fields
A set of hash tables known as indexes contain "pointers" into the records
Individual records can be retrieved without having to search the entire file
Indexes can be searched quickly, thereby allowing the database to access only
the records it needs
Searches use an index which will narrow down the records/data to be searched
Then that section of the file is searched sequentially to find the record required.

Question Answer Marks

10 Eight from: 8

MICR characters are readable even if a document is obscured by marks or


overprinted
MICR systems provide a high level of security since MICR documents are
difficult to forge
The error rate for reading MICR characters is small as compared to other
character recognition systems

Printing of MICR is demanding, requiring difficult-to-achieve standards which


causes it to be slower to print
MICR readers are expensive to purchase
Capable of recognising only MICR fonts written in a specific format
MICR printers run on cartridges that cost far more than other toner cartridges

OCR is much faster than someone manually entering large amounts of text
OCR is cheaper than paying someone to manually enter large amounts of text
OCR can allow documents to be made editable MICR does not

OCR – all documents need to be checked over carefully and then manually
corrected
OCR – not 100% accurate, there are likely to be some mistakes made during
reading...
...such as 1 and I, O and 0.

© UCLES 2018 Page 8 of 9


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will describe the advantages and disadvantages of mobile
networking compared to other types of network.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a structured
and coherent format.
Specialist terms will be used accurately and appropriately

Level 2 (4–6 marks)


Candidates will describe the advantages and disadvantages of mobile
networking compared to at least one other type of network although
development of some of the points will be limited.
For the most part the information will be relevant and presented in a structured
and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only address one side of the argument, and give basic
advantages/disadvantages.
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.:

Advantages
Mobile networks generally offer much more coverage than other systems such
as WiFi...
...which forces users to depend upon hotspots in each area visited
4G offers a coverage of 30 miles and more and with overlapping network
ranges so users are usually assured of complete connectivity at all times
Big problem with WiFi networks is online security so mobiles more secure
Mobile devices can be used out in the field
Portability is one of the main advantages of mobile computing, you are not
restricted to one location in order for you to get jobs done

Disadvantages
Mobile networks are more expensive than traditional WiFi networks to use
Quality of connectivity can be poor if you are not near any of the normal
connections (Wifi, 3G, 4G)
Mobile VPNs are unsafe to connect to, and also syncing devices might also
lead to security concerns
Power consumption- due to the use of batteries in these devices, these do not
tend to last long.

© UCLES 2018 Page 9 of 9


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 11 printed pages.

© UCLES 2018 [Turn over


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 Four from: 4

Open master document/letter


Insert (new) merge field at appropriate position

Either:
Insert SKIPIF merge command/skip record if
Select merge field ‘email’
Set comparison to ‘is blank’/not present.

Or, if attempt at writing a merge field, max 2:

The mergefield formula is: {SKIPIF {MERGEFIELD email field} = “” }

Marks awarded :
{SKIPIF = “” }
{MERGEFIELD email field}

Question Answer Marks

2(a) Two from: 2

(The data type is) hard-coded/built-in


Cannot be altered/is fixed
Have no additional properties.

2(b) Three from: 3

String is a series of characters


Number is any number, with or without decimal places
Boolean has only two possible values, true or false
Undefined is a variable without a value
Null is ‘nothing’ but it is still an object in JavaScript, it is usually empty
Symbol has a unique identifier, is static.

Question Answer Marks

3 Four from: 4

Use a (suitable) name


«. that is not a reserved word
Declare the variable with ‘var’ (command word)
Declared once only in the script/code
Use as global or local variable but not both
Initialise the variable with a value
Do not use quotes around the variable name.

© UCLES 2018 Page 3 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(a) Four from: 4

The purpose of the software and its intended audience


The functions and capabilities of the software to be developed
The operational/user environment in which it will/should be used
The user interfaces to be used
The hardware interfaces that will be needed/hardware requirements
The software interfaces/interfaces to other software that will be needed
Communication protocols/interfaces
The performance levels of the software
The structure of the data elements to be used/developed
The reliability of the software
The security and privacy systems to be used
The safety systems/backup protocols/systems/methods to be used
The constraints/limitations of the software.

4(b) Four from: 4

To be part of the contract between the developers and the


end user/purchaser/commissioning company
To provide a mandate/terms of reference for the design and development of
the software/contain all the information to define the function of the new
software
To provide a list of (testable) design criteria for the software/features to be
included in the software
To list what the user expects the new software to be able to do
To ensure that all mandatory features (e.g. accessibility options) are
included
To rank the features (required by end user) in order of mandatory, desirable,
optional and possible future developments
To provide a set of success criteria against which the software can be
tested/evaluated.

4(c) One from: 1

The wrong user may have been chosen so the user requirements are not
accurate
The user requirements may change during the development cycle/lifetime of
the project so the project becomes more complex/’mission creep’.

© UCLES 2018 Page 4 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)

Candidates will discuss in detail, giving both benefits and drawbacks, of the
use of the use of satellite technology in global positioning systems (GPS).
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain the use, giving a benefit and drawback, of the use of
satellite technology in global positioning systems (GPS).
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe, with a least one benefit/ drawback, of the use of
the use of satellite technology in global positioning systems (GPS).
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

Benefits include:
Access to satellite signals is available over most of surface of earth unlike
signals from terrestrial transmitters
Transmission of GPS signals is not dependent on political boundaries
Satellite signals are accessible over oceans where terrestrial transmissions
are difficult to receive due to the long distances from land
Signals are available to anyone who wishes to use them (unless switched
off by operator of satellite)
Satellites are vandal-proof/ inaccessible to those who would physically
attempt to disrupt their function

Drawbacks include:
Requires a large number (c.25 to 35) of satellites to be in orbit to provide
adequate coverage of terrain
Cannot easily be repaired if malfunctioning
Requires at least 3, preferably 4, satellites to be visible to / received by GPS
receiver to achieve reliable/accurate positioning
Satellite signals are blocked by solid objects/buildings/in tunnels/trees/dense
clouds/ snow storms so, in these circumstances, GPS receivers may«
«fail to provide locations
«may provide erroneous locations.

© UCLES 2018 Page 5 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6 Five from: 5

Choice of CPU: CPU 1


Reference to CPU 1 running JavaScript faster than CPU 2
Tablets are often used to view web pages
Reference to CPU 1 having higher/better score on graphics performance
than CPU 2
As tablets are often used to view video/movies
Reference to CPU 1 having higher/better score on physics calculation
performance than CPU 2
Reference to CPU 1 having a worse/poorer physics calculation performance
than its graphics performance
«which does not really matter in this context/use
As tablets are not used for/do not need to carry out ‘heavy’/intensive
gaming/complex modelling.

Question Answer Marks

7 Six from: 6

Accept/parse input from user


Check for a (single) space
Check that the characters are all alphanumeric/there are no non-
alphanumeric characters (apart from the space)
Check that all letters are in upper case
(Separate and) check the first two characters of outward section/area code
are letters
«and remainder of outward section/district code is ‘1 number’ or ‘1 number
+ 1 letter’
(Separate and) check the inward section is in format ‘1 number + two
letters’/check (sector code) is a number followed by two letters (for Unit
code)
Use of length check to ensure that there are no more than 8 characters and
no less than 7.

© UCLES 2018 Page 6 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8 Eight from: 8

Advantages:
Eliminates the ‘researcher effect’/Hawthorne Effect where the presence of a
researcher may affect the observed data
May provide a larger sample for analysis
Provides access to data that may be inaccessible in any other way e.g.
people may be unwilling to discuss/mention details
Cost of the research is relatively low compared to other methods of
gathering data
Documentation may be highly detailed containing vast repositories of data
gathered over long periods of time/tracking over time/previous
observations/questionnaires
Documentation may contain spontaneous comments of recorders e.g.
personal feelings/comments/observations/notes that give greater insight into
the operations of a company/stock control system

Disadvantages:
Can be subjective/based on views of the researcher
Can be time-consuming compared to other methods of gathering data
Documents are not usually designed for research purposes so may be
difficult to comprehend/follow by researcher
Documentation may be incomplete as documents can be misfiled/lost over
time
Documentation can vary in quality of information
Researcher may lose/damage/misplace important documents during the
research process

Max 6 for all advantages or all disadvantages.


1 mark available for a reasoned conclusion/opinion.

Question Answer Marks

9 Six from: 6

Information about what is to be drawn/instruction to draw circles/use of


(Bezier) curves to draw shape
Location of the centre point of the (outer/larger) circle at 400,300
Radius of the (outer/larger) circle as 200 pixels
Location of the inner/smaller circle at 500, 300
Radius of the inner/smaller circle as 100 pixels
Style/weight of the lines to be drawn
Colour(s) of the circle fill(s)
Degree of opacity/transparency of the circles.

© UCLES 2018 Page 7 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

10 Eight from: 8

E.g.:

Entity Attribute Data type Field


size
Pupil(s) Pupil_ID As appropriate e.g.
integer
Given_name Alphanumeric/ Text
Second_given_name Alphanumeric/ Text
Family_name Alphanumeric/ Text
Date_of_Birth Date
Subject_1 Alphanumeric/ Text
Subject_2 Alphanumeric/ Text
Subject_3 Alphanumeric/ Text
Teacher(s) Teacher_ID As appropriate e.g.
integer
Given_name Alphanumeric/ Text
Family_name Alphanumeric/ Text
Room As appropriate
Subject_taught Alphanumeric/ Text

Marks awarded for:


Both Pupil(s) and Teacher(s) as entities 1 mark
Inclusion of ID attribute for Pupils(s) 1 mark
Inclusion of ID attribute for Teacher(s) 1 mark

Valid pupil(s) attributes+data type+field size max 3 marks


Valid teacher attributes+data type+field size max 3 marks

© UCLES 2018 Page 8 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 Five from: 5

Position in What is happening at the position


Flowchart
A (Checks) if the DOOR IS CLOSED, if not, goes
back to setting temperature/spin speed/start else
moves on to B
B (Checks) if the TEMPERATURE IS SET, if not,
goes back to setting temperature/spin
speed/start else moves on to C
C (Checks) if the SPIN SPEED IS SET, if not, goes
back to setting temperature/spin speed/start else
moves on to load setting and cycle starts
D (Checks) if the STOP/CANCEL BUTTON IS
PRESSED, if so, goes to STOP else moves to E
E (Checks) if the TIME IS UP, if so goes to STOP
else moves back to D

Question Answer Marks

12(a) Five from: 5

Max three (definition) from:


DNS spoofing is Domain Name System spoofing/Domain Name System
cache poisoning
Type of computer hacking
Corrupt data is placed into cache of resolver of DNS/ISP DNS cache
so that an incorrect IP address is returned
Network traffic is diverted/redirected to a different computer to that which
was requested/to hacker’s computer

Max three (prevention) from:


DNS server configured to ignore request from other DNS servers that are
not directly relevant to the query
Use of secure DNS/public key encrypted/digitally signed data to ensure
authenticity of DNS requests
Performing end-to-end validation of DNS requests with HTTPS
Defence is at transport layer.

© UCLES 2018 Page 9 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

12(b) Five from: 5

Max three (definition) from:


DoS is a Denial of Service attack
Where a computer/system is made unavailable by overwhelming the target
system with requests for service
Requests for service are superfluous/have no purpose other than to
disrupt/overload the system
Can use many IP addresses/multiple computers/devices to carry out a DoS

Max three (prevention) from:


Use of firewall configured to deny incoming packets with IP addresses/ports
from identified attackers
Use of tools to analyse incoming data to identify ‘spoof’/
unwanted/illegitimate requests
Use of DNS blackhole/routing to re-route IP addresses intended for attacker
to non-existent IP address/server
Use of DNS sinkhole to direct traffic to valid IP address for analysis to reject
unwanted packets
Use of a specialised/commercial ‘cleaning/scrubbing’ servers/centre to
separate out unwanted traffic from legitimate traffic
Defence is at application layer.

12(c) Four from: 4

Max three (definition) from:


ARP spoofing is Address Resolution Protocol spoofing
To associate/link MAC address of attacker’s device to IP address of e.g.
default gateway/another network host
Occurs when IP address is resolved to a MAC address
So that traffic is directed to attacker instead of intended host/device
Data frames may be intercepted and modified/prevent traffic movement

Max three (prevention) from:


Use of DHCP server configurations to certify that IP addresses are correctly
assigned
Use of tools to cross-check ARP resolutions to block incorrect ones
Built into switches/network devices
Configuring the ARP cache in the OS to ignore requests for updates/hard
coding the ARP cache in OS to prevent updates.

© UCLES 2018 Page 10 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

13 Eight from: 8

Locking the room when not in use


«prevents unauthorised access to devices/computers
«requires meticulous logging of who has key to room
«requires strict adherence by users to rules e.g. no unlocking of doors for
others to go in
Using swipe cards/ keypads to activate locks
«requires extra items e.g. cards/knowledge of codes
«cards can be stolen/lost and used by others
«codes can be forgotten/told to others
Biometric tests to unlock doors
«via keypads/Voice recognition
«can be time-consuming to collect user data
«needs to be updated regularly as biometric data can change
«can be fooled in various ways e.g. recordings of voice
Bolting computers to the desk
«very secure
«computers not easily moved to other locations
«computers in fixed positions may be difficult to use
Using special pens to mark their postcode/owner details onto the
computer/device case
«can allow retrieval of stolen items
«can be a deterrent to thieves
«can deface items preventing resale/reducing asset value
Keeping windows shut/locked/barred - especially if on the ground floor
«prevents thieves from entering
«reduces access to fresh air
Using CCTV video cameras to monitor computer rooms/corridors
«allows surveillance of large areas
«needs constant attendance
Employing security guards to check passes
«effective at preventing unknown people from accessing area
«requires more employees so increases costs
«relies on integrity/honesty of security guard
Positioning screens so passers-by cannot see what is on the screen
«prevents others knowing/discovering the password
«position may be unsuitable for long term use
Type in passwords out of sight of others
«prevents others knowing/discovering the password
«may not be easy to achieve in crowded office/position of keyboard.

© UCLES 2018 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of
the examination. It shows the basis on which Examiners were instructed to award marks. It does not
indicate the details of the discussions that took place at an Examiners’ meeting before marking began,
which would have considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner
Report for Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components,
and some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1(a) Five from: 5

Use of validation (routine) to apply a format/picture check to email address


Ensures that it has an email ID with @ symbol and domain name/conforms
to accepted email format
Use of a drop-down list to select the security question/mother’s name from
pre-set list of questions
To select date numbers from drop down lists
Numbers restricted to those appropriate for month/day/years allowed
Check date selected is appropriate/before today’s date/sensible age implied
Use of radio buttons with two/Boolean choices/check gender against two
possibilities
Selects checked/unchecked for box for terms and conditions
Check password for strength
...check length/content
Compare the two password/email entries to check that they are
identical/match
Use of presence check ensures that all required fields are completed
Customer visually reads form to check for possible errors
When submit button pressed check is activated before passing the data to
the website.

1(b) Submit button to send the form to the store/store’s database. 1

Question Answer Marks

2 Eight from e.g.: 8

X-ray holography can be used for imaging internal organs of the body
No need for invasive surgery
Used for living biological specimens
With very high resolution without the need for sample preparation
Endoscopic holography is used for producing high resolution 3D imaging
With no contact/non-destructive measurements inside the natural cavities of
internal organs
Ophthalmology use to correct problems with lenses implanted after cataract
surgery
In dentistry to store dental records of tooth prints as training aids for
students
In otology (ear studies) to study the vibrations forces/how the inner ear
bones move
In orthopaedics to measure strains/forces on fixation pins/rods
3D images of biological specimens can be created from a series of 2D
radiological images
Using holographic stereogram techniques/conical stereogram/ multiplex
hologram
Holographic contour generation is useful for measurements of biomedical
specimens.

© UCLES 2018 Page 3 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

3 Eight from: 8

Pilot implementation where the system is introduced one branch/department


at a time
Clothing department has new checkouts installed before the others
Staff in clothing department are trained to sell all goods
...and use the new checkouts
Checkouts and staff performance is tested for some time
Ensures that new checkouts are working correctly
Ensures that staff in clothing department understand/can use new
checkouts/sell all goods successfully
Stock and accounting systems are correctly updated
If new system works then staff from other departments can take turns
working in the clothing department
If new system does not work then only clothing department is affected
Other departments can carry on as before until faults are corrected/new
system does work
The changeover may take a long time to implement in the whole store
But there is no danger of having to close the whole store if one section fails
to work properly.

Question Answer Marks

4(a) Five from: 5

Variables X and ‘displayresult’ are declared


...and cleared before use by loop
Loop starts with X at 1
X is incremented by 3 each time it loops
Continues until X reaches 10/while X is less than 10
Displays result as 1, 4, 7
With carriage return between each/on separate lines/underneath each other.

© UCLES 2018 Page 4 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(b) Suitable code could be: 6

<p id="Number"></p>
/JavaScript code follows
<script>
var X = 1;

do {
document.getElementById("Number").innerHTML += X + "<br>";
X=X+3
}
while (X < 10)

</script>

var X =1; 1 mark


Do {...} 1 mark
+=X 1 mark
+ “<br>” 1 mark
X=X+3 1 mark
while (X < 10) 1 mark

4(c) Four from: 4

The code is executed by the web browser


Not on the web server
Web browser may not support the code language
So the code may not execute properly/at all/produce errors
Different browsers run code in different ways
Developers must test all code with all browsers
Same browsers on different operating systems behave differently
Code may produce different results
Code requires high processing power
So webpages may display slowly/not at all
Non-functioning code may deter viewers leading to loss of audience/sales
via the website.

© UCLES 2018 Page 5 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5 Eight from e.g: 8

Laptop has these features required for sales


Physical keyboard for typing emails/product but smartphone usually
onscreen keyboard
Large storage capacity/500GB for local storage of files whereas smartphone
has only 32GB/limited file storage
Access to external/online storage for file exchange/backup
Laptop usually has an optical drive for s/w and product updates whereas the
smartphone does not
Laptop has greater compatibility of software than a smartphone/can use
most features of e.g. office applications

Smartphone has these features required for sales people when away from
office
Smartphone can be used for SMS/text messages
Can make voice calls whereas a laptop cannot
Smartphone always available/can be carried easily/unobtrusively/smaller
than a laptop Smartphone can use 3G/4G whereas laptop is restricted to
WiFi/cable
Smartphone can be used for internet access by laptop/tethering of laptop to
smartphone for internet access
Smartphone is not as good at office tasks as a laptop
Can connect more readily/to more services
Size of device may not be an issue as salesman will use a car/drive to visit.

Question Answer Marks

6(a) Three from: 3

Defining the project in terms of what is to be developed


Gathering user requirements via focus groups/workshops
Defining data flow
Plan processes for managing project
e.g. Risk assessment/communication between development team/quality of
product
Planning tasks/activities.

© UCLES 2018 Page 6 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6(b) Two phases from, max 4 per phase: 8

Data Modelling/Requirements phase:


Review/analysis of data from business model/requirements phase
To create sets of data objects
Define relationship between data objects
Define test plans
Define training strategies where required
Determine implementation methodology

Process Modelling/User Design phase:


Conversion of data objects from previous phase into detailed data flow
Define process for any changes/enhancements to data object sets
Define processes for adding/deleting/modifying a data object
Users interact with system analysts to develop models/early prototypes

Application creation/construction phase:


Development/construction of prototype by expert programmers
Coding may be automated
Coding of components carried out simultaneously/in parallel
User evaluation of prototype
...repeatedly/iterative testing by users
...users suggest improvements/changes to prototype as it is developed
update/modification of prototype

Implementation/testing/cutover phase:
Carrying out the test plan by testing the data flow
...testing interaction/interfaces between components
Testing the complete system
User training where required/writing training/help notes
Rollout of ‘app’ to users

DNA business modelling/requirements phase – stated in part (a).

© UCLES 2018 Page 7 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7 Eight from: 8

Can provide greater bandwidth to provide faster rate of data transfer


Can carry thousands more connections c.f. electrical cable so not so many
cables required
Lower signal losses over distance so less need for amplifiers/repeaters so
less maintenance
Can span longer distances so is used to cross difficult
areas/gaps/seas/oceans
No interaction with other cables as resistant to electrical interference/ground
currents
...can be used in areas of high electromagnetic activity
No crosstalk with adjacent cables so no distortion of signals
Lighter in weight so can be more suitable for use in aircraft
No sparks produced if faulty/cut so safer in high risk areas
Resistant to corrosion so less maintenance required
Smaller cable size so can be used in confined spaces
Difficult to ‘hack’/listen/tap into so more secure
Can go around corners/bends unlike laser beams

Can be more expensive to install than copper cables


Specialist test equipment is needed
Specialist tools are required for joining optical fibres
Physical damage is more likely to interfere with signal transmission
compared to similar with copper cables
Wildlife prefer the covering of optic fibres for nesting materials compared to
those around copper cables
Underwater fibre optic cables are more susceptible to chemical damage
than copper ones e.g. hydrogen will degrade them
Cannot have 90o corners unlike copper cables.

Max six for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

Question Answer Marks

8(a) Two from: 2

Internet-based exchange medium


Allows for instantaneous transactions
Type of electronic money.

© UCLES 2018 Page 8 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(b) Eight from e.g.: 8

Bank transfers are faster/cheaper than with real currency


Leads to increased business activity
Movement of money around the globe/world is easier than with real
currencies
Increase movement of money leads to increase in commerce worldwide
People in poor economies can use digital credits on smartphones obviating
need to carry real currency/have conventional bank accounts
Physically safer than carrying currency so allowing people to retain
wealth/money
Easier to use for e-commerce so e-business can flourish
e-business in underdeveloped countries can easily trade world-wide
Allows use of smart contracts/programmable money due by
automation/automated systems
Linked to e.g. stock markets where money can be paid out depending on
movements of share prices/sales
Currency does not physically exist/difficult to track/trace transactions
Value can fluctuate uncontrollably/without warning/for no apparent reason
Susceptible to/used for criminal activities
If digital currency is lost through e.g. file corruption it can be lost for ever.

Max six for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

Question Answer Marks

9 Eight from: 8

Students can connect to students all around the world


Students see and hear real people in different classrooms
Students can collaborate on projects/share resources/ideas
Courses can be made available to others
Students can attend remotely
Students living in remote rural areas can attend school
No need to make difficult/lengthy travel arrangements
Students can take virtual field trips to dangerous/remote areas in safety
Students can experience remote testing by instructor
...before travel to be properly tested
...increasing chance of positive results
Students who are home-based through e.g. illness can be included in
classes
Education does not unduly suffer.

© UCLES 2018 Page 9 of 10


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

10 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)

Candidates will discuss in detail the advantages and disadvantages of


software-based training methods.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain advantages and disadvantages of software-based


training methods.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the advantages and disadvantages of software-
based training methods.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

Can learn at own pace


Can stop/start at any point
Can use multimedia
Can choose level of course/learning
Progress can be tracked
Interactive games/tests available
Can set personal targets
Can receive feedback/assistance from tutors online
Little interaction with other students/learners
May not be enough pressure/motivation to meet deadlines
parts of course/work may be skipped due to lack of supervision
Some learning cannot be done using software e.g. swimming/driving...
«although s/ware can be supportive.

© UCLES 2018 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 Eight from: 8

The more available bandwidth on the connection the higher quality of video
that can be streamed
Use of a 3G connection to the internet limits video/streaming to low bit rate
of 400 Kb/s
Buffers not filled completely so video pauses/stops/jerky if frames not
received fast enough
Provides video of 320 × 240 pixels without apparent stuttering/buffering/
stop-start issues
This will be a poor video/low definition video as seen on the 1024 × 576
screen
Use of a 4G connection with higher bandwidth of c. 15Mbit/s allows video
with higher bitrates to be viewed properly
This is 1024 × 576 is possible and this is HD quality
Highest bit rates of 19 / 30 Mbit/s allowing resolutions of up to 1920 × 1080
pixels
Available/can be streamed over Wi-Fi (IEEE 802.1 g) wireless
connections....
Which have a maximum of 54 Mbit/s
1920 × 1080 pixels will have to be downscaled for viewing on the
smartphone screen
Which may lead to artefacts and loss of quality.

Question Answer Marks

2 A suitable line of code would be: 6

document.getElementById(“button1”).addEventListener(“click”,
checkreadpagefunction);

Six from:
1 mark for each of:

Capturing the element:


document.getElementById
Identifying the button by name:
“button1”
Checking for the event:
addEventListener
Correct reference to click by mouse:
“click”,
Calling the correct function by name:
checkreadpagefunction);
All correct delimiters and all correct brackets:
. between key words, , after click AND ; after function
() around button1
() around parameter (“click”, checkreadpagefunction);

© UCLES 2018 Page 3 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

3(a) Eight from: 8

S1 to S6 have their own storage devices for storing whole messages


Message sent in its entirety from source to switch S1
...S1 stores whole message on its storage device
S1 connects to S3 and forwards whole message to S3
...S3 stores whole message on its storage device
...message is deleted from S1
S3 connects to S5 and forwards whole message to S5
...S1 stores whole message on its storage device
...message is deleted from S3
Process repeated between S5 and S6 where message is stored before
forwarding to destination
The source and destination of the message are not directly connected
Message can be multiplexed with other messages on network Switches
Method is called ‘message switching’.

3(b) Two from: 2

Improves/makes more efficient use of bandwidth because the data channels


are shared among communication devices
Network congestion can be reduced as messages can be stored temporarily
at message switches
Priorities may be used to manage network traffic
Use of broadcast messaging/messages are delivered to multiple
destinations makes more efficient use of network bandwidth
Message can be stored until recipient decides to pick it up
Process is transparent to applications the use it.

Question Answer Marks

4 Six from: 6

Animator drew frames 1 and 5 and 8


Frame 8 created by flipping/reflecting of frame 1
These are used as key frames
Frame 1 was duplicated/copied (by computer) to create frames 2, 3 and 4
Frame 5 was duplicated/copied (by computer) to create frames 6 and 7
Key frames define the start and end point of transitions that can be used by
a computer-based animation application
Tweening was used to create frames in between.

© UCLES 2018 Page 4 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5 A simple context DFD would be e.g.: 8

Customer Pa
ym Warehouse
en
tf
or
O ha
rd t
er

qu k
re toc

t
O

es
rd of

S
er ha
st t
at
us

te
m

da
R es

up
eq sa
ge

k
ue

oc

r
s

at rde
st

St
fo for Ordering

rh o

n
fo ing
r h pa

io
at
at ym System

irm
ip
en

Sh

nf
t

co
ng
pi
ip
Acknowledgement Stock inventory/

Sh
of updated payment updates
payments

Accounts

Eight from:

Identify all three entities: customer, warehouse, accounts


Order from customer to ordering system
Payment from customer to ordering system
Request for payment to customer from ordering system
Messages re order status payment to customer from ordering system

Stock (check) request from ordering system to warehouse


Shipping order from ordering system to warehouse
Stock update from warehouse to ordering system
Shipping confirmation from warehouse to ordering system
Stock inventory update from ordering system to accounts
Acknowledgements from accounts to ordering system.

© UCLES 2018 Page 5 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6(a) Four from: 4

Made up of pixels
Each pixel is represented by bits
1 to 64 bits per pixel
Number of pixels depending on colour depth
Bits representing pixels packed in rows for bmp
Rows rounded to 32 bit words
Padding needed for loading into memory locations
Usually stored from bottom left up to top right of image.

6(b) Four from: 4

Vector images are stored as co-ordinates/geometric descriptions of shapes


and colours
Digital monitors cannot display co-ordinate-based graphics
Because all digital monitors are pixel-based
Graphics card/computer must convert the co-ordinates/ descriptions into
pixels before sending to digital monitor...
Uses an ADC-type action
Resizes the image to suit the requirements of the user/monitor.

Question Answer Marks

7 Six from: 6

Green and red lasers used


Light from both is sent in parallel stream/collimated
There is minimal divergence
Output about 1 watt
Green laser reads the data from top layer of disc
Data stored as holographic laser interference patterns
Red laser reads reference data stored on aluminium layer at/near bottom of
disc layers
This is the servo information for accurately aligning the read head position
over the disc
A (dichroic) mirror allows the red laser light to pass while reflecting the
green layer
Stores c. 60 000 bits per pulse in densely packed tracks
Compared to a single/one bit per pulse for current optical storage
Can store 100 GB to 1 TB
Phase storage systems can store more data.

© UCLES 2018 Page 6 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8 Six from: 6

Greater flexibility in scheduling work/tasks around other activities


Greater focus on work activities in comfort of own home/surroundings
Reduced stress due to commuting/other workers
Greater flexibility/chances in employment opportunities as have experience
of self-motivation/use of remote technologies
Reduced time off sick as workers can schedule their own time around minor
illnesses
Possible tax benefits from use of home as office
Reduced costs/time spent on travelling to/from work
Employees can choose to live/can reside in a cheaper area/do not have to
live close to/in expensive city centre offices
No need to travel in extreme weather conditions to get to work.

Question Answer Marks

9(a) Six from: 6

Enhance shape outlines for objects to make them more apparent


Enlarge signs to make the words more readable
Change colours of objects to make them more visible
Detect signs/objects in visual range and produce warning sounds to
accompany the images
User learns sounds and associates with object for future reference
Infra-red light amplified to enhanced vision in poor light dark conditions.

9(b) Two from e.g.: 2

Military operations at night to spot the enemy


Enhance vision when night driving e.g. taxi, truck drivers
Improving age-related vision problems
Detecting chemicals for forensic purposes
Detecting heat loss from e.g. buildings/people.

© UCLES 2018 Page 7 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

10 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)

Candidates will discuss in detail advantage(s) and disadvantage(s) of a


range of types of project management software.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain advantage(s) and disadvantage(s) of various types
of project management software.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the advantage(s) or disadvantage(s) of types of
project management software.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:


the various types of PMS with advantages/disadvantages of those
mentioned:

Desktop/single-user/personal:
Suitable for smaller projects
Only one person can use the PMS at any one time

Can be used on mobile devices/smartphones/tablets


May lack all the features of full software

Collaborative:
Allows multiple uses to edit sections of the project
Changes reflected to other users
Some areas may be read-only/unavailable when others are working on them

Visual:
Allows information to be filtered and presented in easier to understand
manner to avoid information overload
Used for fluctuating data
Details not instantly available.

© UCLES 2018 Page 8 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 Eight from: 8

Geographical area that can be covered is much greater than other


broadcasting methods
Costs are less over greater distances/areas...
No need for terrestrial transmitters to homes
Can cover difficult terrain more cheaply
Allows greater bandwidth for data transmission...
Higher definition for TV/bit rate for radio for higher quality broadcasts
More TV/radio channels are possible due to greater capacity
Requires users/viewers/listeners to have (suitable) receiving equipment
...broadcasters may have a limited audience if few people have satellite
receivers
...need line of sight view to satellite to be able to receive
...need to be professionally installed which takes time and can be costly
Satellite technology has a huge setup cost
Satellites do not have an unlimited lifespan
...may become space junk when lifespan is over
Repair of orbiting satellites is almost impossible
Signals to ground can be subject to interference/blockage due to
weather/other signals
Significant delays in signal propagation/travel time of signals/distance from
uplink to receiver can cause anomalies e.g. time differences of several
seconds in transmissions.

Max six for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

© UCLES 2018 Page 9 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

12 Eight from: 8

E-business can be more convenient for shoppers


No need to travel/saves cost/time of going to shopping malls
Reduction traffic congestion/environmental effects of traffic
Less time used for ordering/buying goods than visiting a range of shops
Greater availability/choice of goods to buy
Information about goods is more available/price comparisons can be made
more easily
Online business can start up cheaper/quicker than conventional businesses
so increasing the global economy
E-business has created a range of new jobs/employment opportunities/skill
sets
E-business can operate all the time/24–7 with no shutdown time/shoppers
can buy/trade at any time
A global marketplace has been set up by e-businesses
New marketing models have developed e.g. review forums/online
advertising companies
Loss of jobs around the world due to closure of conventional business/shops
Increase in fraud due to online transactions not being secure
Loss of personal contact with supplies leading to loss of confidence in
business transactions.

Max six for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

© UCLES 2018 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 Data consists of raw facts and figures. 3 4

Information when processed becomes data.


Data is a collection of text, numbers, symbols, images or sound. 3
Data does not need to have meaning to become information.
Knowing that 159.5, 164.3, 162.9 and 172.3 are the heights in
centimetres of pupils in a school makes it a set of data.
Data cannot be interpreted until it is organised. 3
Data is never represented by binary in a computer.
Data must have a context to become information. 3
Data is the result of processing information, usually by computer.
A group of facts which are used in context is called a set of data.

Question Answer Marks

2 A mouse is essential for entering commands when using a command 4


line interface.
Computer beginners often prefer to use a command line interface.
A graphical user interface does not require the user to learn many 3
commands off by heart.
Users can only draw charts when using a graphical user interface.
A graphical user interface consists of windows, icons, menus and 3
pointers.
A microphone is needed to input commands into a dialogue interface. 3
A dialogue interface requires the user to be a computer expert.
A gesture based interface does not require the use of any input
devices.
A gesture based interface usually concentrates on face and hand 3
movements
The time taken for a command to be given and the response
appearing on the screen is not important in a dialogue based
interface.

© UCLES 2018 Page 3 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

3(a) Three from: 3

Can use ctrl key and other keys to save, print, copy and paste text, find and
replace text
Can use arrow keys, home, end, page up and page down to navigate through
text
Can use tab key to indent, delete key to delete forwards, backspace to delete
backwards
Can use the alphabetic keys to enter the text of the book.

3(b) Dot matrix printer – cheaper to run/ink ribbon is cheaper than 3


cartridges/toner/do not have to refill paper as frequently as the others/ribbon
does not need changing as often as the others
Inkjet printer – faster to print out work than dot matrix/better quality output than
dot matrix
Laser printer – do not have to change toner as often as inkjet cartridges/better
quality output than dot matrix.

Question Answer Marks

4 Six from: 6

The global digital divide is the different levels of access of countries to modern
information and communications technology
Less industrially developed nations cannot afford to invest as much in
technology as more well developed countries
It does not necessarily mean that a nation does not have technology just a
difference in the type of technology
This technology can include the telephone, television, personal computers and
the internet
Not all countries are able to keep up with the constant changes in technology
There is a large inequality worldwide in terms of the distribution of installed
telecommunication bandwidth/some countries may not have a well-developed
broadband infrastructure/rely on dialup connections
The majority of the globally installed bandwidth is spread among a tiny number
of countries
Some countries may have lower-performance computers
Some may have difficulty in obtaining technical assistance.

© UCLES 2018 Page 4 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

5 Six from: 6

A virtual private network


Is not physically a private network
It uses the internet or another WAN to transmit data
The data remains encrypted throughout transmission
Data is only decrypted at the destination computer
This process is called tunnelling as it uses a secure means to tunnel through a
publicly accessible network
Uses public telecommunication systems
Normally consists of LANs that may be remote from each other...
...such as different branches of an organisation
It enables organisations to communicate over a large area
It is cheaper than creating a conventional WAN
The security used consists of firewalls, encryption, the use of IP security
(IPsec).

Question Answer Marks

6 Six from: 6

Knowledge base comprises a database of facts and a rules base


A database of facts is built up by the engineer on information and knowledge of
the subject specialists (experts)...
...also data from databases that may exist for the topic
Rules base is a set of rules which are usually of the form IF . . . THEN
The shell often includes the user interface, explanation system, inference
engine and knowledge base editor
Inference engine is the reasoning part of the system
The method used by the inference engine involves the use of forward chaining,
backward chaining or a combination of both
User interface is how the computer interacts with the user, displaying questions
and information on a screen/enables the user to type in answers to the
questions
Knowledge base editing software/knowledge base editor enables the
knowledge engineer to edit rules and facts within the knowledge base
Explanation system explains to a user the chain of reasoning used to arrive at
a particular conclusion.

© UCLES 2018 Page 5 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

7 Six from: 6

A mental model is based on belief not facts


A mental model is what the user will describe in terms of what they need
The designer must produce a user interface which reflects the user’s line of
thought
It is a model of what users know/think they know about a system
Users create mental models very quickly, often before they even use the
software or device
Users’ mental models come from their prior experience with similar software or
devices
If the designers of the user interface do not take the user’s mental model into
account then it is highly likely that it will be hard to learn and use
A user interface that matches the user’s mental model will be easy to learn/it
will take less time to learn
A user interface that matches the user’s mental model will be easy to use
A user interface that matches the user’s mental model will provide the user with
transferable skills so«
«another interface using similar ideas will be just as easy to use
A user interface that matches the user’s mental model enables the user to
predict how to navigate the interface
Training can be used to change a user’s mental model to fit the design of the
interface.

Question Answer Marks

8(a) Select G3:J4 1

Click the Name box at the left end of the formula bar 1

Type Allowance and press enter 1

Or

On the Formulas tab, in the Defined Names group, click Define Name 1

In the New Name dialog box type Allowance 1

In the refers to box type G3:J4 1

8(b) =B11-HLOOKUP(D11,Allowance,2,0) 4

B11- 1 mark
HLOOKUP(D11,) 1 mark
Allowance, 1 mark
2, 0 1 mark

© UCLES 2018 Page 6 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(c) =B11- (F11*VLOOKUP(C11,Rate,2,0)) 7

B11- (F11* 1 mark


VLOOKUP(C11,) 1 mark
Rate, 1 mark
2, 0) 1 mark

Select cell G11 and choose Format, format cells – 1 mark


Click on currency – 1 mark
Select $ and 0 decimal places – 1 mark

Question Answer Marks

9(a) Two from: 2

This is the frequency at which sound samples are taken/number of samples in


a given period of time
There is a minimum rate at which samples need to be taken in order to
faithfully reproduce the original signal
Decreasing sampling rate can lead to distortion of the original.

9(b) Two from: 2

The number of bits used to carry the data in each samples of sound usually, 8
or 16 bits
Decreasing sound sample resolution results in lower quality
It can reduce file size and save storage space.

9(c) Two from: 2

Cuts part of the sound out reducing the length of the track
Reduces file size
Enables unwanted sounds to be removed.

Question Answer Marks

10(a)(i) Five from: 5

Open the create« query design


Select all fields except Discount
Under Code field next to criteria row
Type in square brackets [Enter required code]
Under Group size field next to criteria row
Type in square brackets [Enter required group size]

10(a)(ii) 10, 14 and 7 2

© UCLES 2018 Page 7 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

10(b) Select Duration and set up a lookup table 1

With the values 7, 10, 14, 21 1

Click the arrow to activate the drop down list 1

Select the appropriate value from the list. 1

10(c) Insert rows, above the data exported, for the Lookup table 1

In adjacent columns/rows type in values for names of countries and codes 1

Insert a column to the left of the data exported 1

In the cell adjacent/to the left of the group size type in the 1
VLOOKUP/HLOOKUP formula

Replicate this formula down for all countries. 1

© UCLES 2018 Page 8 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will explain the advantages and disadvantages of control
technologies using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a structured
and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will explain the advantages and disadvantages of more than one
control technology.
Examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a structured
and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will only address some aspects of the use of control technology
and either advantages or disadvantages.
Examples, if used, may lack relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.:

Computer controlled production lines using robots instead of humans has


increased unemployment
Computer-controlled printing presses have replaced many print workers
IT Technicians are needed to maintain computers and robots increasing
employment
Programmers are needed to program computers and robots
However, number of new jobs is far less than old jobs lost

Microprocessor-controlled devices in the home allow people to have more


leisure /free time instead of doing household work
Burglar alarms give people a greater sense of security
Can lead to people becoming lazy/over reliant on microprocessor-controlled
devices in the home
There has been a loss of manual household skills due to increase in use of
microprocessor-controlled devices in the home

Traffic lights – fewer traffic jams than manually controlled


Street lights – more economical – only come on when needed
Air conditioning units in shopping malls make shopping a more comfortable
experience«
«but increases costs for stores«
«and therefore prices to the customer.

© UCLES 2018 Page 9 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

12 Eight from: 8

Benefits
It is relatively easy to communicate with anybody locally or anywhere in the
world regardless of where they are
You can respond to friends quickly
Messages can be received quickly
The cost of sending messages by email/social networking/ instant messaging
is very low unlike postage or normal phone calls
The cost of using VOIP is very low unlike postage or normal phone calls
An email can be sent to many people at the same time
Using internet to send messages saves time as do not have to spend time
visiting/being on the phone to somebody
Emails can be responded to when it is convenient

Drawbacks
Students can spend too much time on social network sites rather than studying
Spam emails can be received which use up storage space
Phishing emails can trap you into giving out personal information
Viruses can be sent by email
With email/messaging is sometimes difficult to clarify what is meant unlike a
normal phone call
Not everyone has an internet connection
Email/messaging – confidential information can be easily forwarded and if done
in error could easily end up in the wrong hands.

© UCLES 2018 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

IGCSE™ is a registered trademark.

This document consists of 13 printed pages.

© UCLES 2018 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

1 4
Dynamic data is data that does not change.

Data that is read from and not written back to a file is called static
3
data.

Data stored on a CD ROM is an example of dynamic data.

Data on a webpage that is updated from time to time is an example


3
of dynamic data.
It is very difficult to add information to a static information source
3
after it has been created.
There is a limited amount of information in a dynamic information
source compared to a static one.

Dynamic information sources are never checked for accuracy.

A static information source can have information updated quickly.

The data in a static data source is always up to date.

There can be many contributors to a dynamic data source so the


3
information can be inaccurate.

© UCLES 2018 Page 3 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

2 4
Compilers and linkers are examples of system software. 3

Device drivers and interpreters are examples of application


software.

Word processing and spreadsheets are examples of hardware.

Software is another name for computer programs. 3

Software is written in machine code before being converted to


high-level language.

Viruses are a type of software. 3

Malicious bots are a type of hardware.

System software directly operates the computer hardware. 3

Operating systems are types of hardware.

A mouse and keyboard are the basic software components of a


computer.

Question Answer Marks

3 Six from: 6

Verification is checking that data that has been/is being entered into a
computer has been copied correctly from the data source
Validation is checking that the data entered is reasonable/sensible
Neither method checks that data is accurate/correct
Although verification helps to stop users from making mistakes when
entering data it cannot check that the data was originally correct
Validation is needed because although the data might be copied correctly,
the original data might be invalid
The date of birth might be in the form dd/mm/yyyy and the data might have
been correctly copied as 1994/12/31 but this is not in the correct format
a format check would have picked this up
Common errors when copying data are transcription and transposition errors
Verification would pick up a transposition error but most validation checks
(except a check digit) would not
Verification would pick up transcription errors but validation might not.

© UCLES 2018 Page 4 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

4(a) Two from: 2

Scans the computer to make sure it is not infected with a virus/to find
viruses
Compares with existing viruses/detects changes in behaviour of files
It may quarantine the infected programs
It will ask the user whether or not they want to delete the infected programs
(Does background scans of downloads and attachments for viruses) and
informs the user if anything found.

4(b) Two from: 2

Creates (additional exact) copies of files, databases hard disks or network


servers
Use these copies to restore the original contents in the event of data loss
Asks user to enter type of backup
Asks if you wish to restore the backup
Asks if you wish to verify the backup
Asks when backup is to take place/frequency of backups.

4(c) Two from: 2

Rearranging files stored on a disk


Causes data to occupy contiguous storage locations
Physically organises the contents of the mass storage device used to store
files
Organises data into the smallest number of contiguous regions (fragments)
Attempts to create larger regions of free space.

Question Answer Marks

5 Three matched pairs from: 6

Induction loop
When a vehicle goes over it sends a signal to the computer that a vehicle
has passed

Sound sensor
In kerb stones constantly feeding back to computer sound level – if noise
above preset value computer registers that a vehicle has passed

(Video/Digital) camera
Above traffic lights and registers car approaching and sends a signal to the
computer

Push buttons
When a pedestrian presses the button, a signal goes to computer to register
pedestrian is waiting to cross.

© UCLES 2018 Page 5 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

6 Six from: 6

It can be accessed via the internet


It is accessed using web browsing software
It was invented by (English scientist) Tim Berners-Lee (in 1989)
HyperText Markup Language (HTML) is the markup (formatting) language
for the world wide web
Web pages are primarily text documents formatted and annotated using
Hypertext Markup Language (HTML)
Uses Uniform Resource Locator (URL) (an address that is unique and used
to identify each resource on the world wide web)
Uses Hypertext Transfer Protocol (HTTP) allowing for the retrieval of linked
resources from across the world wide web
Uses HTTPS to provide secure websites
(In addition to formatted text,) web pages may contain images, video, and
software components
Hyperlinks allow users to navigate between web pages
Comprises websites made up of a number of web pages (with a common
theme)
Is basically a system of web servers (that support specially formatted
documents).

Question Answer Marks

7 Max five from: 5

Three from:

Uses several one-to-many relationships


Uses a tree structure
Links a number of records to one owner or parent primary record
It is not a versatile system
It is limited by using only one type of relationship (so is confined to some
very specific uses)

Three from:

The department can be used as a parent record


The individual employees will represent secondary/child records
Each child record links back to one parent record in a hierarchical structure
Each director can be used as a parent record
The individual departments will represent secondary/child records
The managing director can be used as a parent record
The individual directors will represent secondary/child records
Most types of business databases today use more flexible models to
accommodate more sophisticated types of data management.

© UCLES 2018 Page 6 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

8(a) Six from: 6

It looks for the discount code in cells C3:D5/for each animal


Looks for an exact match
It reads the percentage discount from cells D3:D5, corresponding to the
discount code
Multiplies the percentage discount by the Price and subtracts from the
original price
The values in the lookup range/discount code must remain constant
When the formula in cell E8 is replicated the range C3:D5 requires absolute
cell referencing
If relative referencing were used for cells C3:D5 the formula in cell E9 would
contain C4:D6
This would produce an error as discount code A cannot be found in the
range C4:D6
The lookup value cell reference (accept example) must increment for each
successive row
The Price cell reference (accept example) must increment for each
successive row
When the formula in cell E8 is replicated C8 (and) D8 need to increment to
(C9, D9) which requires relative cell referencing.

8(b) Highlight E8:E13/cells containing discounted price – 1 mark 5


Select/use conditional formatting – 1 mark
Manage rule/create rule if >40 format colour blue – 1 mark
Add rule if between 30 and 40 format colour green – 1 mark
Add rule if <30 format colour yellow – 1 mark

8(c) Pie chart – 1 mark 4


Select A8:A13 and using ctrl key select G8:G13 – 1 mark
Go to Insert chart – 1 mark
Select pie chart – 1 mark

© UCLES 2018 Page 7 of 13


9626/12
9 Cambridg
ge Internatio
onal AS/A Level
L – Mark Scheme Ma
ay/June 201
18
P
PUBLISHED D

Question Answerr Marks

9 Six from: 6

A rules base
b is a set of rules whhich an infe
erence engine uses
The inferrence engin ne uses the data or factts in the kno owledge baase, to
reason thhrough the symptoms
s
Inferencee engine is able to find possible diiagnoses by y using a foorm of
reasoning
The reassoning involv ves forward d chaining, backward chaining
c or a
combinattion of both
User inte
erface asks questions ((about illnes ss)
Patient/d
doctor type in i answers//types in sym mptoms to the
t user inte terface
Inferencee engine compares sym mptoms to those
t in the
e knowledgee base
Inferencee engine uses the ruless base of IF F THEN rules/compparisons/
rules basse consists of IF THE EN rules
Knowledge base editor enabless the knowle edge engineer to edit rrules/and
facts (witthin the knoowledge basse)
Description of forwa ard chaining g
Description of backw ward chainin ng
Possible//suggested diagnoses are output to user inte erface
Explanattion system produces rreasons for suggestions
Reasonss for sugges stions outpu ut using the user interfa
ace.

Question Answerr Marks

10(a) Title 4

Cu
ustomers se
econd name
es beginning
g with queryy

Priice of car qu
uery

ustomers forrm
Cu

All cars in stocck report

Price less tha n $20 000 report


r

Appropriaate title – 1 mark


Appropriaate spacing g – 1 mark
5 consisttent buttonss with appro
opriate labels – 1 mark
Exit butto
on – 1 mark k

© UCLES 2018 Page 8 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

10(b) Four from: 4

Allow follow through from 10(a)

Customers second names beginning with query – allow you to enter one
letter and all names beginning with that letter displayed
Price of car query – allow you to enter a price/range of prices and all
cars of that price/range will be displayed
Customers form – opens a form showing customer details/allows you
to edit data/add new customer record using form entry
All cars in stock report – will give you a printout/display in report form
of all cars in the showroom
Price less than $20 000 report – will give you a printout/display in
report form of all cars lower than $20 000 in price
Exit button – will close the switchboard/application.

10(c) Eight from: 8

Select create
Select query design
Add all tables into query design window
In first column of query select from Cars table (from drop down list)
and choose Make (from drop down list)
In second column select Cars table (from drop down list) and choose
Model (from drop down list)
In next column select Customers table (from drop down list) and
choose first name (from drop down list)
In fourth column select Customers table (from drop down list) and
choose second name from (drop down list)
In next column select Orders table (from drop down list) and choose
Order_No (from drop down list)
In first column next to criteria type in (Like) Frod
In fourth column in the Or row
In the 4th column type in (Like) B*
Save the query.

© UCLES 2018 Page 9 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will describe the benefits and drawbacks of monitoring for both
employer and employee.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will describe the benefits and drawbacks of monitoring for both
employer and employee although development of some of the points will be
limited to employer/employee.
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only address one side of the argument, and give basic
benefits/drawbacks. Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

© UCLES 2018 Page 10 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 Candidates may refer to e.g.:

Employer benefits:

Employers can keep track of the amount of time an employee spends away
from the computer or idle time at the terminal
Video monitoring can deter theft thus maintaining security
Video monitoring can monitor employee productivity/work is up to
standard/employees are working efficiently
Provides an opportunity to watch for mistakes and errors throughout the
workday to help an employee cut down on his mistakes in the future by
pointing out ways he can improve
Use Global Positioning Systems (GPS) devices to track employees in
employer-owned vehicles
If employees understand that the monitoring system is not being used solely
to point out weaknesses, they may become more accepting of being
monitored
Can have video monitoring to catch all safety issues and so able to bring
safety issues to the forefront
Catching blatant disregard for safety on video may also save employer from
potential lawsuits
Can catch those who willingly violate company policy and immediately
employ disciplinary action
Can increase productivity if employees know they are being monitored
Software can also be used to monitor or track employee activity and
productivity...
...ensuring data is secure by using the software to block certain websites
With a GPS device, dispatchers can give drivers very specific driving
directions to a location saving time and money for fuel
If dispatchers know where every van is they can dispatch the one closest to
a particular job
By tracking which drivers are exceeding the speed limit companies can
educate those drivers about the result of speeding, and discipline them as
necessary
Vehicle fleet managers can also improve efficiency by tracking and
eliminating employees’ unauthorised breaks

© UCLES 2018 Page 11 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

11 Employer drawbacks:

Software is expensive to purchase


System is expensive to set up
Can lend itself to lawsuits for infringement of privacy
Can make employees resentful (and less productive) of infringement of
privacy
Mistrust of their employer leads some workers to leave and thus creates
increased turnover of employees

Employee benefits:

A company may also use video monitoring in a parking garage as a security


measure for employee safety
Provides employer with detailed snapshots of how an employee is going
above and beyond the call of duty and can acknowledge employee
excellence

Employee drawbacks:

Most computer monitoring equipment allows employers to monitor without


the employees' knowledge...
...although some employers do notify employees that monitoring takes place
Messages sent within the company as well as those that are sent to another
company or from another company to employee can be subject to
monitoring by employer.

© UCLES 2018 Page 12 of 13


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2018
PUBLISHED

Question Answer Marks

12 Eight from: 8

Benefits:

Calculations can be performed more quickly/more easily/recalculated


automatically
What if statements can be asked without rebuilding a model from scratch
each time the test is carried out
Models provide quick answers to events that may take months to actually
happen
Graphs that are produced to help understand the result will automatically
change (as new values are added/old values altered)
Graphs can be produced automatically/more quickly/no manual method
required
They provide consistent results/not affected by user's inconsistent decisions
There are templates for regularly used spreadsheet models
Spreadsheets can also interact with databases
Data can automatically be imported (from a database) into a spreadsheet
Data can be entered more accurately because of computer-based validation
and verification

Drawbacks:

You cannot account for every possible variable in a financial model


Banks cannot model exactly how much money they think people will save or
borrow
There is no way of predicting the effect that financial crises will have on real
life behaviour
Many variables need to be considered and it is easy to omit some
Some situations will need purpose-built software/technical expertise which is
expensive to buy.

© UCLES 2018 Page 13 of 13


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 1 1 3 9 7 0 9 2 5 6 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory February/March 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SW) 149844/3
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements regarding knowledge, data and information.

Knowledge is remembering a set of facts.

5, 10, 15, 20 are examples of information.

Knowledge is just learning items of data by rote.

Knowledge never requires the understanding of information.

Knowledge is the use of information to solve problems.

Information is data that needs to be processed to give it meaning.


Understanding that 25 is the fifth answer in the five times table requires
knowledge.
Tacit knowledge is knowledge that is easy to pass on to someone else.

A list of all the books written by Shakespeare is just raw data.


Being aware that Pride and Prejudice was not written by Shakespeare requires
knowledge.
[4]

2 Tick the four most accurate statements regarding encryption protocols.

None of the web browsers currently in use support TLS.

SSL stands for Secure Socket Layer.

TLS was used before SSL came into being.

TLS and SSL are protocols that provide security of communication in a network.

SSL uses asymmetric cryptography only.

Encryption protocols prevent hackers from intercepting a message.

TLS stands for Transport Layer Socket.

Client-server applications use TLS in a network to try to prevent eavesdropping.

Encryption protocols enable credit card payments to be made securely.

SSL does not require a handshake to be carried out.


[4]

© UCLES 2018 9626/12/F/M/18


3

3 Indira is the manager of a holiday booking company. She is in the process of updating the
company’s database of holidays. She has a file newholidays.csv which she wants to import to
the database as a new table.

Describe the steps she needs to follow to do this.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/F/M/18 [Turn over


4

4 A company has decided to extend its intranet into an extranet.

(a) Describe the characteristics of a company intranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe the characteristics of a company extranet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/12/F/M/18


5

5 Describe, in detail, four health issues that can arise from the use of IT. For each issue give one
method of preventing it. Each prevention must be different.

Issue 1 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 2 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 3 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 4 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/F/M/18 [Turn over


6

6 Jasvir works in a town in the south of India. He uses email to stay in contact with his parents who
live in the north.

Apart from email and video conferencing, describe four other ways he could use the internet to
communicate with his parents, giving a different drawback for each method.

Way 1 ...............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Drawback .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Way 2 ...............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Drawback .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Way 3 ...............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Drawback .........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Way 4 ...............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Drawback .........................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/F/M/18


7

7 Codecs are used in video conferencing.

Describe how data is transmitted and converted in a video conference.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/12/F/M/18 [Turn over


8

8 Jagwant has typed data into a spreadsheet. Part of the spreadsheet is shown below.

For each column, explain in detail why the data is not fully visible, and describe the most efficient
way he could use to make all the data fully visible by only using the mouse.

C1 ⁝ ✘ fx 4.678932156

A B C D
1 ########### joseph j 4.678932
2 ########### william 5.986433
3 ########### jasvinder7.325689

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/12/F/M/18


9

9 Farzana was given a problem to solve by her maths teacher – ‘Add two integers 15 and 16 and
then multiply the answer by 454.’ She has worked out the answer but now wishes to check her
answer by using the spreadsheet below.

A B C D E F G H
1
2 15 16 45 4 127119375
3

Write down the formula she would have used in cell G2 to produce her answer.

= .................................................................................................................................................. [2]

You can use the space below for any working out.

10 A clothing manufacturer uses codes to store information about its clothes. For example, a pair of
blue trousers with a waist of 80 cm and a leg length of 77 cm could be coded as BT8077.

Explain what each part of the code GT8878 could mean and why there may be problems with
coding other items of clothing in this way. Include in your explanation ways of improving this
method.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [6]

© UCLES 2018 9626/12/F/M/18 [Turn over


10

11 A company keeps details of their payroll data in a single computer file.

Evaluate the use of spreadsheet and database software to store this data using examples related
to payroll for your argument.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/F/M/18


11

12 Below are two tables from a college database. A relationship links the two tables.

Students

Studentid Phone First_name Coursecode


F1278 111000733 Ravinder P301
F3794 111016620 Avtar F402
F4921 117421600 Shokat B115
F9153 114006451 Ravinder B115

Courses
Coursecode Course_Title
P301 Physics
E402 English
B115 Biology
M301 Maths

(a) Explain which fields would be set for primary keys, a compound key and a foreign key, giving
reasons for each choice.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2018 9626/12/F/M/18 [Turn over


12

(b) A list is required of all the students studying Biology.

Write down the steps you would need to take to produce this list using the Students table
only. You may assume the database is already open.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [6]

© UCLES 2018 9626/12/F/M/18


13

13 Sachin has typed in three dates in column A in the spreadsheet shown below. He has used the
formula =TEXT(A1,"dd mmmm yyyy") in C1 and replicated it down. He has used another formula
in column E to extract the name of the month from C1.

Write down the formula he used in E1 which he then replicated down to E3 to extract the months
shown.

A B C D E
1 03/11/2017 03 November 2017 November
2 26/09/2017 26 September 2017 September
3 03/06/2017 03 June 2017 June
4

= .................................................................................................................................................. [4]

You can use the space below for any working out.

© UCLES 2018 9626/12/F/M/18 [Turn over


14

14 Magnetic tape and optical media are used to back up data.

Using examples, evaluate their use in this and other situations.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/F/M/18


15

BLANK PAGE

© UCLES 2018 9626/12/F/M/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/12/F/M/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 9 0 5 0 4 3 6 7 1 0 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory February/March 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all the questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

DC (KN/SW) 152617/3
© UCLES 2018 [Turn over
2

1 A website designer can use bitmap or vector images in web pages.

Explain the characteristics of bitmap images that make them suitable for use on web pages that
advertise items for sale.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/32/F/M/18


3

2 Analyse the impact of network bandwidth on video-conferencing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18 [Turn over


4

3 Fig. 1 shows a diagram of interconnected computer networks that use internet protocol (IP) to
communicate. A file is being sent as six data packets from network A to network H. Nodes B to G
are routers used to connect the networks.

Key
1 router
C E
network
1
1 packet
3
4 4
6 5 3 3 2 4 1
A B G H

4
2 2
3
D F
3 2

Fig. 1

(a) Explain why the packets arriving at network H are in a different order from when they were
sent by network A.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/32/F/M/18


5

(b) Explain the role of the routers B to G in sending the packets from network A to network H.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/32/F/M/18 [Turn over


6

4 A building project has a number of activities, F, G, H, I, J and K, that need to be carried out
between the stages A, B, C, D and E. Fig. 2 shows a Project Evaluation and Review Technique
(PERT) chart for the building project.

F
nths I 2 months
3m K
4 mo on
ths
A J
D E
3 months
5m G
on H
th s
s onth
3m
B

Fig. 2

(a) The building project has a series of milestones to help the managers monitor the progress of
the project.

Identify the first two milestones in this project.

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Describe the critical path through this project.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/32/F/M/18


7

To create the PERT chart, managers first produced a Gantt chart.

(c) On the grid below, draw and label the Gantt chart from which the PERT chart in Fig. 2 would
have been derived.

[5]

© UCLES 2018 9626/32/F/M/18 [Turn over


8

5 A global company has many managers in cities around the world. A mail merge document is being
created to invite each manager to a training event.

The section of the data source file storing the managers’ details for the mail merge is:

First Family
Invite? Title Address1 Address2 City Country Postcode
Name Name
The 12a Bury
Yes Mr Harold Johnson Manchester UK M3 4EN
Beeches St
El Gezira
Yes Mr Ahmed Molokya Dokki Cairo Egypt 12311
St
PO Box Sunshine New
Yes Ms Rowena Cobb Auckland 1010
27 Drive Zealand
Yes Mr Vihann Sardana 1257 SM Mandir Mumbai India 400083
4 The
No Mr Sam Wick Attwood Hume Australia 3000
Avenue
South
Yes Mrs Rethebile Pillay 127 Farnworth Cape Town 7760
Africa
15 Stirling Melbourne
Yes Miss Charlene Foster Melbourne Australia 3205
Highway Terrace
64 Cherry
No Mr Daniel Cross Hinton Cambridge UK CB1 4EF
Rd

Managers in the UK and Egypt will be invited to the event in London while all others will be invited
to the event in Hong Kong. Managers who are not being invited are marked as ‘No’ in the source
file.

A first draft of the mail merge template for the letter is shown here:

<<Title>> <<Family Name>>


<<Address1>>
<<Address2>>
<<City>>
<<Country>>
<<Postcode>>

Dear <<Title>> <<Family Name>>

The company is holding a training event for you on 1 July 2019 in <<City>> and you
are invited to attend.

All expenses for travel from your home city of <<City>> and accommodation at the
meeting will be paid by the company.

Yours sincerely

Managing Director

© UCLES 2018 9626/32/F/M/18


9

(a) Explain how the mail merge may be set up to create letters only to those who are invited.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2018 9626/32/F/M/18 [Turn over


10

(b) Explain how the mail merge template, shown on page 8, must be altered to ensure that the
managers who receive an invitation are asked to the correct event.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18


11

6 Drivers who are 16 years of age or older can apply for a driving licence online.

The government web page code requires applicants to enter their age and then checks if they are
old enough to apply.

The following code captures the applicant’s age. When the applicant clicks the ‘Check now’ button
the age is first checked to ensure that it is numeric. The age is then checked to see if the applicant
is old enough. Suitable messages are displayed as a result of the checks.

Complete the code for the function CheckAgeFunction that checks the age entered by the
applicant and displays an appropriate response.

<html>
<body>
<p>You can apply for a licence to drive when you are 16 years old.</p>
<p>To check if you are old enough to drive, input your age and click
the button:</p>
<input id="AgeNow" value="16" />
<button onclick="CheckAgeFunction()">Check now</button>
<p id="AgeCheck"></p>
<script>
function CheckAgeFunction() {

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

}
document.getElementById("AgeCheck").innerHTML = CanApply;
}
</script>
</body></html>

© UCLES 2018 9626/32/F/M/18 [Turn over


12

7 Describe how wearable computers can enhance health care.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18


13

8 Describe the advantages of evolutionary prototyping compared to throw-away prototyping.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/32/F/M/18 [Turn over


14

9 There are a number of different types of protocols.

(a) PPP is a network protocol.

Describe what is meant by PPP.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/32/F/M/18


15

(b) Email is used to send and retrieve messages between email clients and email servers. One
network protocol in common use for email access is Internet Message Access Protocol
(IMAP).

Describe the features of IMAP that make it suitable for email access on smartphones.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18 [Turn over


16

10 Evaluate the use of asymmetric-key and symmetric-key cryptography when encrypting data for
electronic transmission between two people.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18


17

11 Analyse the impact of the introduction of high definition television systems.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2018 9626/32/F/M/18 [Turn over


18

12 Discuss the impact on society of online banking.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/F/M/18


19

BLANK PAGE

© UCLES 2018 9626/32/F/M/18


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/32/F/M/18


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory March 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2018 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 10 printed pages.

© UCLES 2018 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

1 Knowledge is remembering a set of facts. 3 4

5, 10, 15, 20 are examples of information.


Knowledge is just learning items of data by rote.
Knowledge never requires the understanding of information.
Knowledge is the use of information to solve problems. 3
Information is data that needs to be processed to give it meaning.
Understanding that 25 is the fifth answer in the five times table
3
requires knowledge.
Tacit knowledge is knowledge that is easy to pass on to someone
else.
A list of all the books written by Shakespeare is just raw data.
Being aware that Pride and Prejudice was not written by
3
Shakespeare requires knowledge.

Question Answer Marks

2 None of the web browsers currently in use support TLS. 4

SSL stands for Secure Socket Layer. 3


TLS was used before SSL came into being.
TLS and SSL are protocols that provide security of communication
3
in a network.
SSL uses asymmetric cryptography only.
Encryption protocols prevent hackers from intercepting a message.
TLS stands for Transport Layer Socket.
Client-server applications use TLS in a network to try to prevent
3
eavesdropping.
Encryption protocols enable credit card payments to be made
3
securely.
SSL does not require a handshake to be carried out.

© UCLES 2018 Page 3 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

3 Eight from: 8

Open the holidays database


Specify the new data source
as being a text file
select/browse/type in the file name/newholidays.csv
When given the option choose whether to import, append or link the data,
choose import
When asked to choose whether to append the data to an existing table, or to
create a new table choose
create new table
When asked to choose which format, delimited or fixed width choose
delimited format
When asked to choose which delimiter, choose comma
Specify exactly which data in the document is to be imported
Indicate whether the first row contains column headings or whether it should
be treated as data/specify field names
Specify the data type of each field
Choose whether to import the structure only, or the structure and the data
together
Choose a new primary key for the new table
Name the new table newholidays or relevant name.

Question Answer Marks

4(a) Three from: 3

A private (computer) network used within one organisation


Can only be accessed by workers within the organisation/ restricted access
network
Based on internet technologies/TCP/IP protocols
Used to share information within the organisation
Tends to be a LAN.

4(b) Three from: 3

A website that allows controlled access to authorised users to an


organisation's network
Usually only allows access to a subset of the information on the
organisation’s intranet
Provides access to specific services without granting access to the
organisation's entire network
Usually operates within a VPN framework
Usually operates over a public telecommunications network.

© UCLES 2018 Page 4 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

5 Four matched pairs from: 8

RSI in the fingers/wrists/carpal tunnel syndrome from continual


typing/clicking of mouse
Take a break every hour/take regular breaks/use wrist rests/use ergonomic
keyboard

Cubital Tunnel syndrome from prolonged use of mobile phones keeping


elbow bent
Use of headphones and microphone/use of Bluetooth headset/earpiece

Headaches/eyesight problems from eyestrain caused by staring at the


monitor for long periods
Take regular breaks / focus on distant objects from time to time/use anti-
glare screen

Upper back/neck problems by continually staring at the monitor from


below/above
Position monitor at eye height and appropriate distance

Lower back pain caused by sitting in same position for long periods
Use ergonomic furniture/ sit up straight/use a back support/foot rests.

© UCLES 2018 Page 5 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

6 Four matched pairs from: 8

Instant messaging where Jasvir types a message and the parent


immediately sees it pop up in their IM window
There is no time to reflect on the message being sent unlike an email where
the draft can be reviewed before sending /limited length of message/could
be impersonal no voice/sound

VoIP - Voice Over Internet Protocol Jasvir would use a microphone


connected to a computer/speaks using a VoIP phone and the software
converts it into a format that can be sent over the internet
The person receiving the call must also have VoIP application running in
order to listen/can be affected by bandwidth issues

Social networking sites where Jasvir could post a message with


pictures/video on his page/area
Can later regret posting pictures or comments that were thought funny at the
time/other people apart from parents may be able to see site thereby losing
privacy/other people may message you interrupting flow

Blog/microblog – Jasvir could use a website writing about what is happening


to him
May not get immediate feedback/parents will not have immediate feedback

Chat rooms – Jasvir could meet his parents in a chat room and chat to them
by typing a message
Parents might not be skilled chatters and not know how to keep
conversation private/other people apart from parents may be able to enter
room thereby losing privacy.

Question Answer Marks

7 Six from: 6

Video-conferencing systems require digital compression of audio and video


streams (in real time)
The hardware or software that performs compression is called a codec...
... a coder/decoder
Compression ratios of 50:1 are achieved
The digital stream is subdivided into data packets...
...which are then transmitted through a digital network
Each packet has a 'header' that identifies its contents
Protocol used is usually determined by the need to have reliable or
unreliable communications
TCP is a protocol designed for error free transmission of data when delivery
needs to be assured
TCP will retransmit missing packets when data is lost
TCP protocol can cause delays and reduced throughput
User Datagram Protocol (UDP) is a less reliable protocol in which any data
lost during transmission is not retransmitted
Video-conferencing is better suited to UDP than TCP because packets that
arrive late would spoil the conference.

© UCLES 2018 Page 6 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

8 Six from: 6

What has happened:


Column A contains numbers which are too long to fit in the cell so have
been changed by the spreadsheet software to ######
Column B contains text which has a font size too big for the cells and the
spreadsheet software has truncated the right hand side and bottom to fit the
cell
Column C contains decimal numbers which are too long to fit so the
spreadsheet software has ignored the rightmost digits

Solution:
Click on top left corner to highlight all cells

Double click on join/boundary between column headings


Double click on join/boundary between row headings.

Question Answer Marks

9 =(A2+B2)*C2^ D2 or =(A2+B2)* POWER(C2,D2) 2

(A2+B2)* with correctly positioned brackets 1 mark


C2^D2 or POWER(C2,D2) 1 mark

Question Answer Marks

10 Six from: 6

G means grey, T means trousers waist 88 cm and leg length 78 cm


G could stand for any colour beginning with G
Better to have two or three letters such as GY, GN
T could stand for top or T-shirt
Better to have two (or three) letters such as TR, TO, TS
Waist and leg length could be transposed
Better to have W88 or 88W followed by L78 or 78L.

© UCLES 2018 Page 7 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

11 Eight from: 8

Advantages of database software/Disadvantages of spreadsheet software


Complex filters are easier to create using database software such as names
of workers working in a specific department who earn above a certain
amount
Queries can be saved using database software then used with updated data
such as new workers joining the company
Fields easier to name and query using database software such as name,
address, rate of pay, wages
Can only create a relational database using database software to relate a
table of workers’ payroll data to a table of personal details

Disdvantages of database software/Advantages of spreadsheet software


Calculated fields can be difficult to create using database software such as
calculating wages
Easier to create complex formulae in spreadsheets for calculating net wages
after taxes, insurance, pension contributions
Easier to use functions in spreadsheets such as countif to count the number
of workers earning more than a certain wage
Charts are easier to produce using spreadsheet software to show
expenditure on wages over time
Repeated data can be easier to enter using spreadsheet software
Spreadsheets are easier to use to model different scenarios such as future
wage expenditure.

One mark is available for a reasoned conclusion.


Must have at least two from each section to gain full marks.

Question Answer Marks

12(a) Six from: 6

Studentid would be set as the primary key in the Students table


Coursecode would be set as the primary key in the Courses table
Studentid and Coursecode could form a compound key in the Students table
(if required)
Coursecode would be set as the foreign key in the Students table
Studentid and Coursecode are primary keys as they contain unique data
Studentid and Coursecode could form a compound key as they could
collectively uniquely identify a record
Coursecode is foreign key in the Students table as it is a primary key in the
Courses table but appears as a field in the other table
which is linked to that table.

© UCLES 2018 Page 8 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

12(b) Six from: 6

Select Student table


Click on Create and select Query Wizard
Choose Simple Query Wizard
Select fields to be used
Assign the name ‘Biology Students’ to the query
Select Modify query design
Under the field Coursecode
in the criteria box type in B*/B115
Run the query.

Question Answer Marks

13 =MID(C1,4,LEN(C1)-8) 4

MID(C1,) 1 mark
4, 1 mark
LEN(C1) 1 mark
-8 1 mark

© UCLES 2018 Page 9 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

14 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will explain the advantages and disadvantages of magnetic tape
and optical media using relevant and appropriate examples.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will explain the advantages and disadvantages of magnetic tape
and optical media.
Examples used will be for the most part relevant.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will give the advantages/disadvantages of magnetic tape and
optical media.
Examples, if used, may lack relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may make reference to e.g.

A single magnetic tape stores more data than a single optical disk
so more appropriate for server backups
Single tapes cost more than a single optical disk
so unlikely to be used by students to back up their work
Tapes cost less per unit memory
so more cost effective for large companies storing lots of data
Optical disks are not quite as portable as a tape
particularly where a large amount of data is stored requiring more disks
Both last longer than the technology that reads them however
Tape is corrupted if placed near to a magnetic field
Optical disks have faster data access times
so more suitable for non-backup purposes
Magnetic tape is less susceptible to damage than optical discs during
handling
as it is completely encased
Optical disks are more viable where there are large variations of
temperature.

© UCLES 2018 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory March 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2018 series for most
Cambridge IGCSE®, Cambridge International A and AS Level components and some Cambridge O Level
components.

® IGCSE is a registered trademark.

This document consists of 12 printed pages.

© UCLES 2018 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

1 Four from: 4

Can be saved/stored in a variety of formats so that the webpage can be


viewed on all computer platforms
Can be output from many applications so easy to produce
Can be created from the pixel arrays in memory
Can display vast range of colours depending on bits per pixel
Can display subtle gradations of shades/colour/greyscales as it is made of
pixels
Best for photo-realism/continuous tones compared to vector images so
images of advertised items appear more realistic
Individual pixels can be modified to customise/edit the image so images of
advertised items are more appealing/attractive
Can translate easily to dot-format output for use with CRTs/printers
Can be used in simple animations e.g. Animated gifs
Can be compressed so that file size is reduced and loads faster.

Question Answer Marks

2 Eight from: 8

Bandwidth requirements are higher to allow more detail in video images


Video-conferencing requires higher resolution video because there are often
several people on screen at once
Need to see facial features/body expressions of participants clearly
One person to another (when video-conferencing) does not require high
resolutions
High bandwidth (of 2–4 Mbps) would deliver an (H720p) high definition
image for multiple participants
Low bandwidth (of 512 kbps) would be sufficient for one-to-one video-
conferencing
Low bandwidth does not allow high definition images so would not be able
to properly see the faces of multiple participants
High bandwidth would allow higher frame rates/30fps for smooth motion
Limited/low bandwidth requires trade-off between resolution and frame rate
Resolution priority for displaying slideshows/documents in detail
Motion priority for displaying video presentations.

Max 6 for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

© UCLES 2018 Page 3 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

3(a) Two from: 2

Each packet takes a different route through the network


Each router ‘decides’ which router to send it onto depending on other
network traffic e.g. router A will send some packets to router C and some to
D
If next router is busy/unavailable
If a packet is mis-sent/corrupt en route then re-transmission is requested
from originating router
Time taken along different routes is not the same
Arriving at different times at network H.

3(b) Five from: 5

Each router has a stored lookup table of IP addresses/routes to the next


router/network
Routing table is stored at control plane of router
Routing table used to choose next router/router to which to send packet
Static routes B to C to E to G are pre-programmed to show route to
destination
Dynamic routing protocols build up a table of preferred routes between
connected routers/networks
B to C to F to G if router E is inefficient/out of action/in heavy demand
If destination is unknown router B will send packet to next known router/C or
D
If C/D router does not know destination to H then packet is sent onto next
router/E or F.

Question Answer Marks

4(a) One mark for both milestones: 1

A and C

4(b) Two from: 2

Critical path made up of activities F, I and J / A to C


C to D and D to E
Totalling 4 + 2 + 3 = 9 months.

© UCLES 2018 Page 4 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

4(c) Five from: 5

Max 2 from:
Activities on Y axis and labelled
Time on X axis and labelled
Milestones identified

Max 3 marks from:


All activities shown correctly 3 marks
5 activities shown correctly 2 marks
4 activities shown correctly 1 mark
Less than 4 shown 0 marks

5(a) Four from: 4

Filter/select the records in the data source on Invite? field


To remove the “No” /”Yes” are selected
Create new data source of “Yes” invites
Use new source file for the mail merge.

OR

Use SKIPIF function in a merge field


To skip “No” in Invite? field so that these are not used in the merge
Example code: { SKIPIF "{ MERGEFIELD Invite? }" = "No" }
Place the SKIPIF field at beginning of the template
So the record is ignored early in process.

© UCLES 2018 Page 5 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

5(b) Eight from: 8

Replace the second <<City>> field/<<City>> field in body of letter


As this does not show correct city for meeting but repeats the address city
Insert variable field in place of this field to select meeting city based on
Country field
Use a nested IF
Comparing Country with UK and with Egypt to select “London” as meeting
city
If neither match then Hong Kong is selected as meeting city

Example code: { IF { MERGEFIELD Country} = “UK” “London” {IF {


MERGEFIELD Country } = “Egypt” “London” “Hong Kong”} }

Allow 1 mark for { IF { MERGEFIELD Country} = “UK” “London”


Allow 1 mark for {IF { MERGEFIELD Country } = “Egypt” “London” “Hong
Kong”} }

© UCLES 2018 Page 6 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

6 Eight from: 8

Suitable code would be:

var AgeNow, CanApply;


AgeNow = Number(document.getElementById("AgeNow").value);
if (isNaN(AgeNow)) {
CanApply = "Please enter your age in numbers.";
} else {
CanApply = (AgeNow < 16)? "You are too young to apply for a
licence.": "You are old enough to apply for a licence.";

Mark points: 8 from:

Declare the variables, must be exact variable names as in Question:


var AgeNow, CanApply;

Capture the input of the age:


AgeNow=Number()

Use of correct capture code:


document.getElementById("AgeNow").value;

Use of “isNaN” to check that the input is a number:


if (isNaN(AgeNow))

Display error message if not a number:


CanApply = "Please enter your age in numbers.";

Use of “if...else” to make decision:


} else {

Use of comparison check: CanApply = (AgeNow < 16)?

Appropriate display messages: e.g. "You are too young to apply for a
licence.": "You are old enough to apply for a licence.";

Messages match comparison: i.e.:


< 16... too young; old enough
>16.... old enough; too young

© UCLES 2018 Page 7 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

7 Eight from e.g.: 8

Help physicians/doctors monitor and diagnose illness/disease


Data transferred directly by head up display/to retina of doctor/ anaesthetist/
surgeon during medical procedures
Less time spent on reading/tracking data
Wearable systems (e.g. e-skin) on patients including sensors send data
direct to doctors
Enhance patient-doctor interaction
Patients have more access to data
Doctors can monitor remotely
Assist in medical procedures/surgery
Access to digital images during procedures/overlay of images onto
procedure
Remote guidance during procedures/emergency assistance
Assist/allow patients to manage and control pain
Implantable systems to control diabetes/blood pressure/food intake/activity
Improve employment of personal fitness regimes
Fitness bands to track activity/sleep patterns
Educate patients in their health
Patients can monitor own health and be aware of changes/conditions and
make decisions themselves.

Question Answer Marks

8 Four from: 4

User/client may decide that the early version is all that is needed
Developers can focus on developing parts of the system that they
understand
Instead of developing a whole system which might be beyond their
comprehension
Improvements/alterations/add-ons to the system can be created later
First prototype is not discarded so materials/time are not wasted
Throw-away prototypes may not work at all/be on paper only
Can be used in interim until final system is complete.

Question Answer Marks

9(a) Two from: 2

(PPP is) Point to Point Protocol


Used in (most) dial-up connections
Has link monitoring capability/can log how many errors occur
Can maintain multiple links and enable them to function as single link
Provides authentication via password authentication protocol
(PAP)/challenge-handshake protocol (CHAP)
Requires a username/password to allow dial in to network.

© UCLES 2018 Page 8 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

9(b) Eight from: 8

Can use multiple email clients simultaneously


Allows use of same email system on mobile devices and PCs at same time
Changes on one device are reflected on other devices connected at same
time
Provides multiple mail boxes
Can create/use folders/mailboxes on server
Can copy messages
Email clients stay connected to server
Email messages downloaded as and when they arrive at server
Provides faster response time to emails to recipient compared to POP3
Allows access to sections of message/partial messages/partial fetch
Messages with attachments can be retrieved without downloading the
attachment
Can stream content as it is being retrieved
Message state information available
Uses flags stored on server to check whether message has been
read/replied to/deleted
Can be seen across connected devices
Server-side searches can be carried out
Email client can search server for email messages using user-defined
criteria.

© UCLES 2018 Page 9 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

10 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)


Candidates will evaluate in detail, giving both advantages and
disadvantages of, the use of asymmetric and symmetric cryptography when
encrypting data for electronic transmission between two persons.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain the use, giving both an advantage and
disadvantage, of asymmetric and symmetric cryptography when encrypting
data for electronic transmission between two persons.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe, with a least one advantage/disadvantage of, the
use of asymmetric and symmetric cryptography when encrypting data for
electronic transmission between two persons.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

symmetric-key cryptography:

Advantages:
shares the same/related key with sender and receiver...
...process is relatively fast
...used on solid state drives to encrypt/decrypt data as it is written/read
to/from disk.

Disadvantages:
...keys must be kept secret from others
...sharing keys between sender/ recipient is a security issue
...if key is compromised both sender and recipient are at risk.

© UCLES 2018 Page 10 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

10 asymmetric key cryptography (public key)

Advantages:
uses different keys to encrypt and decrypt
...public key is known to all, but private key is known only to recipient
...only private key must be kept secret
«anyone can use public key to encrypt
...only recipient can decrypt
...keys are not shared
...so is very secure
...if private key compromised, only senders data is at risk as any other data
sent to others is encrypted with a different public key.

Disadvantages:
...process is relatively slow...
...so not suitable for e.g. hard disk encryption on-the-fly.

Question Answer Marks

11 Five from: 5

Much larger screens possible without perceived loss of picture quality


Resolution almost double that of standard high definition screen means
greater detail in picture
Higher quality connectors/leads/HDMI cables required to carry signals from
set-top boxes to TV and these cost more/more difficult to manufacture
New methods of delivering HD/UltraHD/4K/8K content are required as
current broadcast systems/terrestrial/current satellite TV
Investment in infrastructure required
Increased use of internet/cable TV connections
New/updated (recording) systems required to process the
MPEG4/H.265/VP9 data/signals
Requires faster processors/greater processing power in devices
Broadcasts cannot deliver/do not have the bandwidth required
Internet/network infrastructure has to be capable of providing high
bandwidth connections to homes/businesses
Streaming of high definition TV requires greater bandwidth
High-speed/bandwidth internet is not universally available
Better home networking products/network configuration required to steam
high definition TV
QoS settings in routers need to be configured to ensure smooth video.

© UCLES 2018 Page 11 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme March 2018
PUBLISHED

Question Answer Marks

12 Eight from: 8

Banking is available at any time so financial transactions can occur at any


time
No issues with banks being closed/international time zones
Financial transactions are carried out/confirmed more quickly than at
branches/ATMs
Accounts can be monitored/used at on different/mobile devices
Transactions can be tracked
Demand for access to technology/internet increased due to moves to online
banking
Increase in online banking has led to decrease in number of bank
branches/personal customer service
Online banking has led to reduction/removal of paper audit trails
Online banking has led to increased security threats/issues as a result of
phishing/scams.

Max 6 for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

© UCLES 2018 Page 12 of 12


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 9 5 4 5 4 0 2 0 7 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/SC) 153473/3
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements regarding validation and verification.

Verifying data is checking that data is correct.

Validating data is checking that data is correct.

Validation is the process of checking that the data entered into a system is the same as
the source data.
Visual verification is a type of verification.

A range check is an example of verification.

Validation is checking that data is sensible.

A range check is the best check to make sure transposition has not occurred when typing
in a bar code.
Visual validation is a type of validation.

Double data entry is a type of verification.

A type check will prevent a letter of the alphabet being typed into a numeric field.

[4]

2 Tick the four most accurate statements regarding input and output.

A scanner can be both an input and output device.

A touch screen can be both an input and output device.

Input devices allow the user to communicate with the computer’s operating system.

Output devices allow data to be stored electronically for future use.


Inputs must be converted to analogue data before they can be processed by the
computer.
All inputs always come in the form of digital data.

A plotter is an output device.

Outputs always come in the form of a printout.

A microphone is an input device.

A pen drive is an input device.


[4]

© UCLES 2018 9626/12/O/N/18


3

3 One of the dangers of accessing the internet is the increased risk of malware attacks.

Describe the distinctive features of each of the following types of malware.

Trojan Horse ....................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Worm ................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Spyware ...........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Adware .............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/O/N/18 [Turn over


4

4 (a) Describe the advantages of using a web authoring package to create a web page rather than
writing HTML code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) Describe the disadvantages of using a web authoring package to create a web page rather
than writing HTML code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/12/O/N/18


5

5 Spreadsheet software enables users to make use of formulas and functions.

Using examples, compare and contrast a formula and a function.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2018 9626/12/O/N/18 [Turn over


6

6 Aeroplane manufacturers often use computer models to trial new aircraft.

Describe four benefits of using a model to create and run simulations.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [4]

© UCLES 2018 9626/12/O/N/18


7

7 There are a number of communication technologies and their associated networks used for
transmitting data.

Describe the following types including their suitability, with reasons, for use in a video-conference.

(a) ADSL

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(b) SDSL

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

(c) ISDN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [3]

© UCLES 2018 9626/12/O/N/18 [Turn over


8

8 A secretary has been given a list of product details. She was asked to type the details into a
spreadsheet. Unfortunately, when she typed them in, wrong data was entered into cells A7, A10,
A16 and B10.

List secretary was given Spreadsheet produced by secretary

Product number Department code


38366614481 B167
14533707617 B132
92648277616 C185
83028907250 A675
99028485231 D132
77662318299 B453
11997211500 E342
71458052066 D543
81391876632 E723
13917086392 Z418
45608392059 M329
54445757756 B132
14050284074 A675
30965517520 E647
43270336250 F341
97118134256 C231

(a) Describe four validation checks which could have prevented these errors from occurring,
including a description of how they would have prevented the errors.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2018 9626/12/O/N/18


9

4 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

(b) The secretary’s manager typed a formula into cell D2 to calculate the price of the product
which is given at the beginning of each Product number.

Write down the formula which he would have entered in cell D2 and describe how the Price
was formatted so that it would appear as it does in the spreadsheet.

= ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

.............................................................................................................................................. [4]

You may use this space for working out.

© UCLES 2018 9626/12/O/N/18 [Turn over


10

9 People who are employed to develop software often refer to the need for a detailed data dictionary.

Describe the components of a typical data dictionary.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [5]

© UCLES 2018 9626/12/O/N/18


11

BLANK PAGE

© UCLES 2018 9626/12/O/N/18 [Turn over


12

10 A company provides cars for several leasing organisations in districts of London, in the UK, such
as Enfield or Lewisham.
Agents buy cars from a number of showrooms.
The company buys a car from an agent before then providing it for lease.

The holding company needs to keep a record of:

• each car
• which agent bought each car
• which showroom it came from.

An example of a database for this company in unnormalised (0NF) form is shown below.

Car ID Make Model Agent ID Showroom Agent Agent Email


Name
LO01 Lopa Wolf 001 Jones, John jhart@welovecars.com
Enfield Hart
FO01 Frod Squire 002 Morgan, Carl cmason@amazingcars.com
Lewisham Mason
YA01 Yayota Badger 003 Jones, Joe jsmith@mew.com
Greenwich Smith
CN01 CNX Rabbit 001 Lewis, John jhart@welovecars.com
Ealing Hart
WX01 WX Gull 001 Jones, John jhart@welovecars.com
Brent Hart
YA02 Yayota Loaf 002 Evans, Carl cmason@amazingcars.com
Lambeth Mason
FO02 Frod Peer 003 Evans, Joe jsmith@mew.com
Lambeth Smith
LO02 Lopa Fox 001 Jones, John jhart@welovecars.com
Enfield Hart
YA03 Yayota Plum 001 Morgan, John jhart@welovecars.com
Lewisham Hart
CN02 CNX Chariot 003 Lewis, Joe jsmith@mew.com
Ealing Smith

© UCLES 2018 9626/12/O/N/18


13

(a) Convert this database to third normalised form by completing the field names for each table
provided.
You are not required to enter any data into the tables.

Cars

Field1 Field2 Field3 Field4 Field5

Agents

Field1 Field2 Field3 Field4

Showrooms

Field1 Field2 Field3

[10]

(b) Complete the relationship diagram below by completing the tables and showing the types of
relationships between them.
In the top cell write the name of the table and write the field names underneath.
Indicate the primary key (pk) for each table and any foreign keys (fk).

[8]

© UCLES 2018 9626/12/O/N/18 [Turn over


14

11 A number of items of computer hardware are used for storing data.

Evaluate the use of RAM, ROM and hard disks for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/O/N/18


15

12 A company is planning a new computer network and is faced with choosing between a peer-to-peer
and a client-server network.

Discuss the advantages and disadvantages of a peer-to-peer network compared with a


client-server network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..................................................................................................................................................... [8]

© UCLES 2018 9626/12/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/12/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 5 3 1 2 0 8 0 2 2 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used in this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 13 printed pages and 3 blank pages.

DC (KN/SW) 150105/4
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements regarding peer-to-peer and client-server networks.

Peer-to-peer networks must have a central server.

Client-server networks generally offer greater security than peer-to-peer networks.

Peer-to-peer networks can support millions of users with no loss of performance.

The server will determine which users can access the files on a client-server network.
In a client-server network each client functions both as a client and as a server
simultaneously.
If one computer crashes it has no effect on the other users in a client-server network.

A client-server network is cheaper to set up than a peer-to-peer network.

Peer-to-peer networks always require an employee to manage the network.

In a peer-to-peer network only one computer is allowed to use the printer.


In a peer-to-peer network computers can communicate and share files with every
other computer on the network.
[4]

2 Tick the four statements which are true regarding user interfaces.

The colours used in a dialogue interface are of key importance.

A mouse is an essential input device when using a command line interface.

A graphical user interface requires you to type in a large number of instructions.

A command line interface is mainly used by more advanced computer users.

A gesture based interface allows users to point with their fingers as a method of input.

A command line interface needs menus and icons to operate it.

A dialogue interface can interpret hand movements to carry out commands.


A gesture based interface is very reliable as most users have similar gestures for
communicating.
The font size is the most important feature of a command line interface.

A graphical user interface involves the use of windows and pointers.


[4]

© UCLES 2018 9626/13/O/N/18


3

3 There are many types of data storage device including hard disk drives, solid state drives, optical
drives and magnetic tape drives.

Describe the purpose of these storage devices and how they store data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/13/O/N/18 [Turn over


4

4 The lack of a broadband connection is a symptom of the digital divide.

Explain why different groups of individuals do not have a broadband connection and what can be
done to improve this situation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

5 Many applications use computer models to trial new processes.

Give four drawbacks of using a model to create and run simulations.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/13/O/N/18


5

6 A head teacher wishes to computerise the marking of student exam papers. She is investigating
systems that use optical mark recognition (OMR).

(a) Give three advantages of using an OMR system compared to marking papers manually.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

(b) Give three disadvantages of using an OMR system compared to marking papers manually.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9626/13/O/N/18 [Turn over


6

7 Describe, in detail, three different safety (apart from e-safety) issues that can arise from the use of
IT. For each issue give one method of helping to prevent it. Each method must be different.

Issue 1 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 2 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 3 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/13/O/N/18


7

8 Video-conferencing is a commonly used method of communication. It has an effect on different


sections of society.

Describe the impact of video-conferencing on the following groups of people.

General public ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Medicine – doctors, nurses and patients .........................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Education – teachers and students ..................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/13/O/N/18 [Turn over


8

9 Schmidt and Partners own a chain of shoe shops. They pay their workers a weekly wage consisting
of a basic wage plus commission. Workers only get paid commission if they have made $500
worth of sales in that week.

The commission is paid at the rate of 10% of the amount of sales made over $500.
Below is a spreadsheet showing some of the workers and the wages they were paid in one week.

A B C D E F G
1 Sales person Department Value of sales Basic wage Commission Total wage
2
3 Li Chung Childrens $550 $50 $5 $55
4 Graham Phillips Adults $450 $60 $60
5 Karl Gustaph Childrens $700 $55 $20 $75
6 Paula Meldrew Childrens $850 $60 $35 $95
7 Shen Bin Adults $1,000 $55 $50 $105
8 Ram Babu Childrens $350 $45 $45
9 Joan Adams Childrens $780 $55 $28 $83
10 Hu Zheng Adults $620 $65 $12 $77
11 Louis Raphael Adults $420 $45 $45
12 Ambrin Satem Childrens $900 $50 $40 $90
13 Tong Mu Adults $940 $60 $44 $104
14 Malcolm Novak Adults $870 $70 $37 $107
15
16 $131
17

Fig. 1

(a) Write down the formula which should go in cell E4 which is easily replicable. It should calculate
the commission earned but leave the cell blank if no commission is earned.

= ................................................................................................................................................

...............................................................................................................................................[5]

You can use the space below for any working you need.

(b) The shop manager wants to know the total commission the shop is paying to those workers in
the Adults department who sold over $800 worth of shoes.

Write down a conditional formula which should go in cell E16.

= ................................................................................................................................................

...............................................................................................................................................[7]

You can use the space below for any working you need.

© UCLES 2018 9626/13/O/N/18


9

(c) The manager wishes to know the number of workers who did not earn any commission.

Write down the formula he would enter into cell E18 to obtain this value. The formula must
work even if the data in the spreadsheet changes in the future.

= ................................................................................................................................................

...............................................................................................................................................[2]

(d) When the manager was originally given the spreadsheet by the IT technician it looked as
shown in Fig. 2 below:

A B C D E F G H
1 Sales person
DepartmentValue of Basic Wag Commission Total wage
2
3 Li Chung Childrens 550.00 50.00 5.00 55.00
4 Graham Phillips
Adults 450.00 60.00 60.00
5 Karl Gustaph
Childrens 700.00 55.00 20.00 75.00
6 Paula Meldrew
Childrens 850.00 60.00 35.00 95.00
7 Shen Bin Adults 1000.00 55.00 50.00 105.00
8 Ram BabuChildrens 350.00 45.00 45.00
9 Joan AdamsChildrens 780.00 55.00 28.00 83.00
10 Hu Zheng Adults 620.00 65.00 12.00 77.00
11 Louis Raphael
Adults 420.00 45.00 45.00
12 Ambrin Satem
Childrens 900.00 50.00 40.00 90.00
13 Tong Mu Adults 940.00 60.00 44.00 104.00
14 Malcolm Novak
Adults 870.00 70.00 37.00 107.00
15
16 131.00

Fig. 2

Explain, in detail, the features of spreadsheet software he had to use to change its appearance
as shown in Fig. 2 to that shown in Fig. 1 (page 8), using the shortest number of steps. The
larger column widths became 20 points wide and the narrower one (column F) 12 points.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/13/O/N/18 [Turn over


10

10 Below is a database showing a list of details about cars in a showroom.

Reg_No Make Model Doors Colour


L456 SRA BMS 2000 7 Green
B648 MAV Opla Valiant 7 Green
M452 DQY BMS 2000 5 Red
M846 RCA BMS 3000 5 Blue
L678 RTS Frod Vic 5 Red
B358 FCD Opla Eagle 5 Green
F692 TEC Opla Eagle 5 Red
S492 LZR Opla Artsa 5 Black
N671 SAE Vellox Lemming 5 Black
R762 VDA Frod Leo 4 Blue
F457 REW Opla Eagle 4 Blue
K789 KNM Opla Artsa 4 Blue
X236 BEC Opla Eagle 4 Black
Z341 TYU Opla Eagle 4 Green
J456 REA Vellox Kestrel 4 Black
L423 FRO Vellox Lemming 4 Blue
L567 APQ Vellox Kestrel 4 Green

To find all Eagle models the search conditions would be Model = “Eagle”.

(a) Using only Boolean operands, comparison operators and wild cards, write down the most
efficient search conditions which would produce lists of:

(i) Reg_Nos beginning with the letter ‘L’.

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Frod cars which are Blue.

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Eagles which are Red, Blue or Green.

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2018 9626/13/O/N/18


11

(b) Describe how the database has been sorted to produce the one shown.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Identify, giving reasons, the key field in the database. Give reasons why the other fields are
not suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/13/O/N/18 [Turn over


12

11 Normalisation is often used when converting a set of data into a meaningful database.

Discuss the advantages and disadvantages of normalisation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/13/O/N/18


13

12 Encoding of data can be thought of as applying a code such as letters, symbols and numbers
to data for conversion into a cipher. It can also be thought of as a form of analogue to digital
conversion such as used by codec software. At times it is the term applied to the coding of data.

Evaluate the need for encoding data and analyse the different methods that can be used to encode
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/13/O/N/18


14

BLANK PAGE

© UCLES 2018 9626/13/O/N/18


15

BLANK PAGE

© UCLES 2018 9626/13/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/13/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 7 1 7 9 4 9 9 8 6 6 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed to be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 16 printed pages.

DC (LK/CT) 152975/2
© UCLES 2018 [Turn over
2

1 Credit card accounts are often required for payment when buying goods online.

(a) Describe how the use of a credit card for online purchases may subject credit card account
holders to fraud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/32/O/N/18


3

(b) Explain how a merchant selling goods online can attempt to combat credit card fraud.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/32/O/N/18 [Turn over


4

2 Some text is being written for use as a title in a slideshow presentation. The text is to be zoomed
in and out as the titles are displayed in different sizes on the slides.

The sample letter in Fig. 1 has been created as a bitmap graphic while the sample letter in Fig. 2

B
has been created as a vector graphic.

B B

Fig. 1 Fig. 2

Explain, in detail, why letters created as in Fig. 2 are more suitable for use in the slideshow than
those created as in Fig. 1.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/32/O/N/18


5

3 Evaluate the impact on the environment of the use of robotics in industry.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/O/N/18 [Turn over


6

4 Fig. 3 shows a diagram of interconnected computer networks that use internet protocol (IP) and
packet switching to communicate. A large file is sent from network A to network H. Nodes B to G
are routers used to connect the networks. During the sending of the file from network A, network I
also starts to send a much larger video file to network H.

C E

File sent File from A being


from A received at H

A B G H
File from I being
received at H

File sent
from I

I
D F

Fig. 3

(a) Explain, in detail with reference to the diagram, how the file from network A and the file from
network I travel through the network from router to router and start to arrive at network H at
the same time.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/32/O/N/18


7

(b) Explain why router C does not always send the packets to router D.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/32/O/N/18 [Turn over


8

5 Quintin is a programmer who writes code in HTML and JavaScript for use in online forms. The
code is developed and ‘white-box’ tested before being used.

Quintin is developing the code below. He has added comments to the code. The code asks a user
to input two numbers and adds the numbers together. It also displays the total and whether or not
it is greater than 10.

<html>
<body>

<!-- the next six lines collect the two numbers to be added-->

<br/>Enter first number:


<input type="number" id="nm1" name="num1">
<br/><br/>Enter second number:
<input type="number" id="nm2" name="num2">
<p id="add"></p>

<script>
function myaddfunction() {
//the next line assigns the first number input to the variable y
var y = document.getElementById("nm1").value;
//the next line assigns the second number input to the variable z
var z = document.getElementById("nm2").value;
//the next line adds the two numbers and assigns the result to the variable x
var x = +y + +z;
//the next line checks if x is greater or not greater than 10 and reports
accordingly
var A = (x >10) ? x+ " is greater than 10":x+ " is not greater
than 10";
//the next line prints the results onto the page
document.getElementById("add").innerHTML = A ;
}
</script>
<!-- the next two lines asks the user to click the button and then the script
is executed
<p>Click the button to calculate the total.</p>
<button onclick="myaddfunction()">Add the numbers</button>
<br/>
</body>
</html>

© UCLES 2018 9626/32/O/N/18


9

(a) Explain how Quintin could use ‘white box’ testing to ensure that the JavaScript code produces
the correct result every time.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[8]

© UCLES 2018 9626/32/O/N/18 [Turn over


10

(b) Explain why it is good practice that Quintin places his JavaScript code in external files rather
than embeds the code in the actual page code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/32/O/N/18


11

6 Describe how quantum cryptography can help to ensure that data is kept secure when being
transferred electronically between users.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/32/O/N/18 [Turn over


12

7 The table shows part of a database used to control the level of stock items in a clothing store.
Reordering is done when the number left in stock reaches or falls below the minimum level allowed
by the store management.

Item_Code Description_of_Item Item_Price Current_Stock_ Minimum_Stock_ Quantity_to-be_


Level Level_Allowed Reordered
XYP234 Walking boots (pair) $128.50 16 15 10
ABG765 Jackets $99.56 15 10 15
SCC653 Gloves (pair) $36.99 23 20 25
SOX785 Socks (pair) $25.99 33 30 50
XYT981 Scarf $34.45 16 10 20

A customer purchases two pairs of walking boots, three pairs of socks and a scarf. The items each
have a barcode and are scanned at the checkout when purchased.

Describe, in detail, the processes that would occur when the purchases have been made to ensure
that the appropriate new orders are placed to maintain the stock levels.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2018 9626/32/O/N/18


13

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

8 Evaluate the use of the infra-red method of data transmission in wireless communications.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/32/O/N/18 [Turn over


14

9 A software development company uses throw away prototyping to develop parts of a new system.

(a) Give one reason why the company would use throw away prototyping.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(b) Describe two drawbacks to the company of using throw away prototyping.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/32/O/N/18


15

10 Analyse the suitability of using pilot implementation to install and use WiFi internet access for
guests in a chain of hotels.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

Please turn over for Question 11.

© UCLES 2018 9626/32/O/N/18 [Turn over


16

11 Analyse the effectiveness of observation as a research technique.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/32/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 5 5 3 0 7 2 7 0 7 7 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (LK/CT) 152976/3
© UCLES 2018 [Turn over
2

1 The photograph shown in Fig. 1 was taken and manipulated into the JPEG image shown in Fig. 2.

Fig. 1 Fig. 2

(a) Describe all the software features used to change the image in Fig. 1 to produce the image in
Fig. 2.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................... [2]

© UCLES 2018 9626/33/O/N/18


3

(b) Explain why the features of the face in Fig. 2 are no longer easy to see.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18 [Turn over


4

2 An office area has an air conditioning system. The user guide for the system contains a
troubleshooting flowchart that users can follow if the air conditioning is not working properly. The
flowchart is shown in Fig. 3.

START

No No
Use REMOTE to Is REMOTE Are Batteries Insert
turn on power working? installed? Batteries

Yes Yes Yes


Are Batteries Replace
dead? Batteries
Is the Air Yes
Conditioning
No
working at
all?

Is the Air
No Yes
Conditioning
working
properly?
Check the Power No Is the Power
Supply is Supply
connected to connected?
power outlet No Is the Air Yes Clear the
Intake Air Intake
Yes blocked?

No
No Is the Power
Check the Power
Supply is Supply switched
switched on on?
Yes Clean the
Is the Air
Air Filter
Yes Filter dirty?

Yes
Reset Circuit Is there a
Breaker Circuit Breaker No
blown?

Yes Is the No
Are there any Set the
No Temperature
heaters on in Temperature
set correctly?
the room? correctly

Yes Is there Yes


Check with a power Turn off heaters
Power Company outage?
No
Are there Yes Reduce the
too many number of people
No
people in the in the room
room?

No Is the Yes
Reset Timer Call Service Engineer to
Timer set No
correctly correct fault with Air
correctly?
Conditioning

STOP

Fig. 3

© UCLES 2018 9626/33/O/N/18


5

The flowchart is considered to be too complex to follow quickly.

Using the information in the flowchart, redesign the troubleshooting guide by completing the table
below with statements of instructions so that it is more easily understood. Some sets of instructions
have been done for you.

Symptom Items that must be checked


If, after checking the items below, the air conditioning still does not work, call the service
engineer.
The remote control does not Check the batteries in the remote control are installed.
work
Check the batteries in the remote control are working.
The air conditioning does
not work at all

The air conditioning is not


working properly

[8]

© UCLES 2018 9626/33/O/N/18 [Turn over


6

3 Evaluate the use of Bluetooth® wireless technology for communication between devices.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/O/N/18


7

4 Industrial robots are used to position and fit a windscreen to a new car during a car assembly
process.

Describe ways in which the necessary positional and procedural data could be ‘taught’ to the robot
so that the windscreen is correctly fitted to the car.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18 [Turn over


8

5 JavaScript can be embedded in the code of web pages to add interactivity to a page.

Explain what is meant by the following terms when they are used in JavaScript:

(a) an array.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(b) a variable.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(c) a function.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(d) a comment.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(e) an object.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

(f) an expression.

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[1]

© UCLES 2018 9626/33/O/N/18


9

BLANK PAGE

© UCLES 2018 9626/33/O/N/18 [Turn over


10

6 A company selling goods online has a network which is configured to allow its web server, FTP
server and email server to be accessible from the internet. The company was concerned that
the network configuration exposed the whole LAN to security risks so has attempted to improve
security by altering the configuration from that in Fig. 4 to the configuration shown in Fig. 5.

Company internal file, Company internal file,


database and email servers database and email servers
Staff Staff
workstations workstations
Web server Web server

Email FTP server Internal


server Firewall Email firewall
server External
FTP server
firewall
Router
Router

Internet Internet

Fig. 4 Fig. 5

(a) Explain how the network configuration has been altered in order to maximise security of the
company file servers while still allowing access to the other services from the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18


11

(b) Explain, using the information from Fig. 5, why the additional firewall provides more security
for the company network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

7 (a) Describe what is meant by web-conferencing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/33/O/N/18 [Turn over


12

(b) Describe how web-conferencing is made possible by internet technologies.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18


13

BLANK PAGE

© UCLES 2018 9626/33/O/N/18 [Turn over


14

8 A research and development (R&D) department of a company develops expensive goods. The
development process has to be kept secret. The biometrics of all staff of the company are to be
measured and used to restrict entry via the doors to the department.

A comparison of the suitability of various biometric methods that are available for use to identify
staff has been compiled and is shown in Fig. 6. Each aspect of the biometric method has been
rated High (H), Medium (M) or Low (L).

Biometric How How unique How How easy How How Performance
method universal is the permanent to collect acceptable resistant rating of the
used to amongst measurement is the at door to staff? is the biometric
identify a staff amongst staff measurement from method to method
member of members? members? to staff staff? circumvent
staff members? by staff?

Face H L M H H L L

Fingerprint M H H M M H H

Hand shape/ M M M H M M M
geometry

Veins in M M M H H H M
hand

Iris H H H H H H H

Retina H H M L L H H

Voice M L L M H L L
of staff
member

Facial H H L H H H H
thermogram
of staff
member

DNA of staff H H H L L H H
member

Key: H = High M = Medium L = Low

Fig. 6

© UCLES 2018 9626/33/O/N/18


15

Use the information in Fig. 6 to choose, with reasons, the biometric measurements that would be
most suitable for measurement at the door.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/O/N/18 [Turn over


16

9 (a) Describe the benefits to students of using online tutorials.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

(b) Give two reasons why a student might not be able to use online tutorials.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/33/O/N/18


17

10 Social networking has led to a reduction in meeting face to face.

Discuss the ways that social networking has changed social patterns.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/33/O/N/18 [Turn over


18

11 Computer-aided manufacture (CAM) can be used in the production of a computer motherboard.

Analyse the use of CAM.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18


19

12 Analyse the use of project scheduling tools to organise a project to create a road bridge.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/33/O/N/18


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/33/O/N/18


Cambridge International Examinations
Cambridge International Advanced Subsidiary and Advanced Level
* 4 7 8 1 9 0 3 5 5 9 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2018
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your Centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used in this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 13 printed pages and 3 blank pages.

DC (KS) 171572
© UCLES 2018 [Turn over
2

1 Tick the four most accurate statements regarding peer-to-peer and client-server networks.

Peer-to-peer networks must have a central server.

Client-server networks generally offer greater security than peer-to-peer networks.

Peer-to-peer networks can support millions of users with no loss of performance.

The server will determine which users can access the files on a client-server network.
In a client-server network each client functions both as a client and as a server
simultaneously.
If one computer crashes it has no effect on the other users in a client-server network.

A client-server network is cheaper to set up than a peer-to-peer network.

Peer-to-peer networks always require an employee to manage the network.

In a peer-to-peer network only one computer is allowed to use the printer.


In a peer-to-peer network computers can communicate and share files with every
other computer on the network.
[4]

2 Tick the four statements which are true regarding user interfaces.

The colours used in a dialogue interface are of key importance.

A mouse is an essential input device when using a command line interface.

A graphical user interface requires you to type in a large number of instructions.

A command line interface is mainly used by more advanced computer users.

A gesture based interface allows users to point with their fingers as a method of input.

A command line interface needs menus and icons to operate it.

A dialogue interface can interpret hand movements to carry out commands.


A gesture based interface is very reliable as most users have similar gestures for
communicating.
The font size is the most important feature of a command line interface.

A graphical user interface involves the use of windows and pointers.


[4]

© UCLES 2018 9626/11/O/N/18


3

3 There are many types of data storage device including hard disk drives, solid state drives, optical
drives and magnetic tape drives.

Describe the purpose of these storage devices and how they store data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/11/O/N/18 [Turn over


4

4 The lack of a broadband connection is a symptom of the digital divide.

Explain why different groups of individuals do not have a broadband connection and what can be
done to improve this situation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

5 Many applications use computer models to trial new processes.

Give four drawbacks of using a model to create and run simulations.

1 .......................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

3 .......................................................................................................................................................

..........................................................................................................................................................

4 .......................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2018 9626/11/O/N/18


5

6 A head teacher wishes to computerise the marking of student exam papers. She is investigating
systems that use optical mark recognition (OMR).

(a) Give three advantages of using an OMR system compared to marking papers manually.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

(b) Give three disadvantages of using an OMR system compared to marking papers manually.

1 ................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2018 9626/11/O/N/18 [Turn over


6

7 Describe, in detail, three different safety (apart from e-safety) issues that can arise from the use of
IT. For each issue give one method of helping to prevent it. Each method must be different.

Issue 1 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 2 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Issue 3 ..............................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Prevention ........................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/11/O/N/18


7

8 Video-conferencing is a commonly used method of communication. It has an effect on different


sections of society.

Describe the impact of video-conferencing on the following groups of people.

General public ..................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Medicine – doctors, nurses and patients .........................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Education – teachers and students ..................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2018 9626/11/O/N/18 [Turn over


8

9 Schmidt and Partners own a chain of shoe shops. They pay their workers a weekly wage consisting
of a basic wage plus commission. Workers only get paid commission if they have made $500
worth of sales in that week.

The commission is paid at the rate of 10% of the amount of sales made over $500.
Below is a spreadsheet showing some of the workers and the wages they were paid in one week.

A B C D E F G
1 Sales person Department Value of sales Basic wage Commission Total wage
2
3 Li Chung Childrens $550 $50 $5 $55
4 Graham Phillips Adults $450 $60 $60
5 Karl Gustaph Childrens $700 $55 $20 $75
6 Paula Meldrew Childrens $850 $60 $35 $95
7 Shen Bin Adults $1,000 $55 $50 $105
8 Ram Babu Childrens $350 $45 $45
9 Joan Adams Childrens $780 $55 $28 $83
10 Hu Zheng Adults $620 $65 $12 $77
11 Louis Raphael Adults $420 $45 $45
12 Ambrin Satem Childrens $900 $50 $40 $90
13 Tong Mu Adults $940 $60 $44 $104
14 Malcolm Novak Adults $870 $70 $37 $107
15
16 $131
17

Fig. 1

(a) Write down the formula which should go in cell E4 which is easily replicable. It should calculate
the commission earned but leave the cell blank if no commission is earned.

= ................................................................................................................................................

...............................................................................................................................................[5]

You can use the space below for any working you need.

(b) The shop manager wants to know the total commission the shop is paying to those workers in
the Adults department who sold over $800 worth of shoes.

Write down a conditional formula which should go in cell E16.

= ................................................................................................................................................

...............................................................................................................................................[7]

You can use the space below for any working you need.

© UCLES 2018 9626/11/O/N/18


9

(c) The manager wishes to know the number of workers who did not earn any commission.

Write down the formula he would enter into cell E18 to obtain this value. The formula must
work even if the data in the spreadsheet changes in the future.

= ................................................................................................................................................

...............................................................................................................................................[2]

(d) When the manager was originally given the spreadsheet by the IT technician it looked as
shown in Fig. 2 below:

A B C D E F G H
1 Sales person
DepartmentValue of Basic Wag Commission Total wage
2
3 Li Chung Childrens 550.00 50.00 5.00 55.00
4 Graham Phillips
Adults 450.00 60.00 60.00
5 Karl Gustaph
Childrens 700.00 55.00 20.00 75.00
6 Paula Meldrew
Childrens 850.00 60.00 35.00 95.00
7 Shen Bin Adults 1000.00 55.00 50.00 105.00
8 Ram BabuChildrens 350.00 45.00 45.00
9 Joan AdamsChildrens 780.00 55.00 28.00 83.00
10 Hu Zheng Adults 620.00 65.00 12.00 77.00
11 Louis Raphael
Adults 420.00 45.00 45.00
12 Ambrin Satem
Childrens 900.00 50.00 40.00 90.00
13 Tong Mu Adults 940.00 60.00 44.00 104.00
14 Malcolm Novak
Adults 870.00 70.00 37.00 107.00
15
16 131.00

Fig. 2

Explain, in detail, the features of spreadsheet software he had to use to change its appearance
as shown in Fig. 2 to that shown in Fig. 1 (page 8), using the shortest number of steps. The
larger column widths became 20 points wide and the narrower one (column F) 12 points.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2018 9626/11/O/N/18 [Turn over


10

10 Below is a database showing a list of details about cars in a showroom.

Reg_No Make Model Doors Colour


L456 SRA BMS 2000 7 Green
B648 MAV Opla Valiant 7 Green
M452 DQY BMS 2000 5 Red
M846 RCA BMS 3000 5 Blue
L678 RTS Frod Vic 5 Red
B358 FCD Opla Eagle 5 Green
F692 TEC Opla Eagle 5 Red
S492 LZR Opla Artsa 5 Black
N671 SAE Vellox Lemming 5 Black
R762 VDA Frod Leo 4 Blue
F457 REW Opla Eagle 4 Blue
K789 KNM Opla Artsa 4 Blue
X236 BEC Opla Eagle 4 Black
Z341 TYU Opla Eagle 4 Green
J456 REA Vellox Kestrel 4 Black
L423 FRO Vellox Lemming 4 Blue
L567 APQ Vellox Kestrel 4 Green

To find all Eagle models the search conditions would be Model = “Eagle”.

(a) Using only Boolean operands, comparison operators and wild cards, write down the most
efficient search conditions which would produce lists of:

(i) Reg_Nos beginning with the letter ‘L’.

...........................................................................................................................................

.......................................................................................................................................[2]

(ii) Frod cars which are Blue.

...........................................................................................................................................

.......................................................................................................................................[2]

(iii) Eagles which are Red, Blue or Green.

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2018 9626/11/O/N/18


11

(b) Describe how the database has been sorted to produce the one shown.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(c) Identify, giving reasons, the key field in the database. Give reasons why the other fields are
not suitable.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

© UCLES 2018 9626/11/O/N/18 [Turn over


12

11 Normalisation is often used when converting a set of data into a meaningful database.

Discuss the advantages and disadvantages of normalisation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/11/O/N/18


13

12 Encoding of data can be thought of as applying a code such as letters, symbols and numbers
to data for conversion into a cipher. It can also be thought of as a form of analogue to digital
conversion such as used by codec software. At times it is the term applied to the coding of data.

Evaluate the need for encoding data and analyse the different methods that can be used to encode
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2018 9626/11/O/N/18


14

BLANK PAGE

© UCLES 2018 9626/11/O/N/18


15

BLANK PAGE

© UCLES 2018 9626/11/O/N/18


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge International
Examinations Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download at www.cie.org.uk after
the live examination series.

Cambridge International Examinations is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of University of Cambridge Local
Examinations Syndicate (UCLES), which is itself a department of the University of Cambridge.

© UCLES 2018 9626/11/O/N/18


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory October/November 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 8 printed pages.

© UCLES 2018 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1(a) Eight from: 8

(Unauthorised persons obtain credit card details by various methods):


skimming/interception of details/theft of details from website/phishing
Use of number generator to create card numbers close to known good one
Last four numbers are usually in a sequential range with same expiry date
Use of generated card numbers to make transactions
Even if customer not present/if card stolen transactions can still be carried
out using security numbers
Security number obtained by theft/phishing/selling/smishing by
unscrupulous merchants
Thieves/hacker use credit card for small transaction to see if valid
Once small transaction is successful then much larger transactions are
made
Subscriptions to web services are a common method to test card validity as
nothing physical is purchased
Repeat billing/invoicing/recurring charges for card holder
An uncancelled ‘membership’ is charged monthly
Use of spyware/keylogger software to capture credit card numbers/details
as they are typed.

1(b) Five from: 5

Demand for extra security information/PIN or card security code/last three


numbers
Check location of card holder matches address given for delivery by use of
IP lookup of purchaser for geolocation
Compare delivery address with credit card billing address
Use of third-party services/escrow services to take payment from card
account and pass it to merchant
Not displaying the full card number (Primary Account Number – PAN
truncation) on receipts/email/website confirmations
Not storing the whole number/credit card details on computer systems
Encrypt stored credit card details so that they are not understood by
unauthorised persons.

Question Answer Marks

2 Six from: 6

Fig. 2 can be scaled/zoomed without loss of quality/clarity


Because it is (a vector graphic) made up of instructions/code on how to
create the letter
When resized/zoomed the graphic is recalculated so no loss of quality
Fig. 1 cannot be scaled/zoomed without loss of quality/clarity
Because it is (a bitmap image) made of square pixels
The rounded appearance is created by pixels of varying density
If zoomed/enlarged too much then pixels are visible
If zoomed the letter becomes blurred/lacks definition/unreadable.

© UCLES 2018 Page 3 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)


Candidates will evaluate in detail the impact of the use of robots on the
environment.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain the impact of the use of robots on the environment.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the impact of the use of robots on the environment.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (zero marks)


Response with no valid content.

Answers may make reference to e.g.:


More selective/accurate spraying of crops thus diminishing overspray/use of
chemicals on crops
Remote monitoring of global warming/oil spills/water pollution with use of
independent robotic submarines carrying sensors into dangerous areas
Autonomous gathering of data in dangerous/hazardous areas to monitor
environmental factors
Use in food packaging/production by reduction in contamination of product
as no human contact
Use in industry to reduce environmental waste/resource use...
...e.g. solar panel cleaning robot uses less water than humans
...less energy used in ‘dark’ factories where heating and lighting are not so
important as few humans work in them
Leads to reduction in traffic so there is less pollution
Negative impacts could include:
...increased use of power over manual labour
...increased use of scarce resources e.g. precious/rare metals to
manufacture robots
...environmental damage caused by extraction of precious/rare metals.

© UCLES 2018 Page 4 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(a) Six from: 6

Each packet sent by network A takes a different route through the network
Each packet has source/destination address stored in header
Each router has a stored lookup table of IP addresses/routes to the
destination (if known)
Routing table is stored at control plane of router
Used to choose next router/router to send packet to
Static routes are pre-programmed to show route to destination B to C to E to
G
Dynamic routing protocols build up table of preferred routes between
connected networks B to C to F to G if router E is inefficient/out of action/in
heavy demand
If destination is unknown router B will send packet to next known router, C
or D
If C/D router does not know destination to H then packet is sent onto next
router, E or F.

4(b) Six from: 6

Router D may be not responding


Router D may be in heavy demand
Router D may have failed/be offline
There may a policy set up in router C to over-ride the routing tables so that
the packets are not sent to router D
To enforce a QoS for specific services that take precedence over other
packets
Router C may have more than one set of routing protocols because it is
connecting to several different networks at once
Alternative routers may respond quicker/before router D/alternative routes
are available sooner than via router D.

© UCLES 2018 Page 5 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5(a) Eight from: 8

Checking each line of code/statement


Ensures that each line of code is executed at least once
Ensures that var y and z assign the collected numbers as required
Checks that the additon of y and z is correct
Ensures that the correct message is displayed when result assigned to A
Checking each branch/decision in the code
Checks that decisions are carried out correctly
So that values put in A can be compared
Ensures that result is checked against > 10
Ensures that the correct result is put in var × as required
Checks every possible pathway through the code
So that test values in var y and z cause each subsequent path to be
followed
So that test values in x are assigned to A to produce both the messages “is
greater than 10” and “is not greater than 10” depending on value in A.

5(b) Six from: 6

Can separate code into different conceptual/functional areas for ease of


development/testing/understanding
Separating HTML and JavaScript code provides modularity to code
Which is easier to read/maintain/update by Quintin/different coders as
required
Can call the code several times/from different pages/re-use the code
No need to rewrite/have several copies/copies on each web page
Code only has to be tested once/checked for errors once
File/JavaScript is cached by web browser
No need to reload it/fetch code repeatedly if need on other pages
Reduces network access/reduces cost of fetching data
JavaScript code embedded in web pages can slow loading times/reduce
browser performance
Web page can slow/stop while browser executes code.

Question Answer Marks

6 Six from: 6

Use of polarised light for encoding data


In quantum states for transmission between two parties
Initial polarisation/oscillation of first two photons determines 0 and 1 bit of
the data
Polarisation of subsequent bits is determined at random
Recipient measures data using random polarisation until data is as sent
Used to establish a shared key between sender/recipients
No third party learns/sees the key
Key then used to create other keys for use in encryption
Called quantum key distribution (QKD)
Data state is changed when viewing by others
Impossible to copy/eavesdrop on data encoded in quantum state without
alerting the sender/recipients.

© UCLES 2018 Page 6 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7 Eight from: 8

Scanned barcodes contain item code for walking boots/XYP234


Code for walking boots/XYP234 used to look up the items in the database
Matching record is found in database
2 pairs of boots sold so value in field holding the number of w/boots in stock
is reduced from 16 to 14
....new value is less than/below/< re-order level/15 so an order for 10 pairs
of boots is generated/alert is generated to request an order be placed for 10
pairs
3 pairs of socks have been sold so value in field holding the number of
socks in stock is reduced from 33 to 30
Current Stock level is compared with Minimum Stock level allowed
....new value is equal to re-order level so an order for 50 pairs is
generated/alert is generated to request an order be placed for 50 pairs
Number of scarf/scarves sold is deducted from the value in the field holding
the number of scarf/scarves in stock...
1 scarf has been sold so value in field is reduced from 16 to 15...
...new value is above/greater than/ > the re-order level so no order is
generated/alert made
Re-orders are generated/alerts created to advise staff to (re-)order 10 pairs
of walking boots and 50 pairs of socks
Automatic orders are placed for the items/staff respond to alerts and place
orders for new stock.

Question Answer Marks

8 Eight from: 8

Suitable for use in ‘free-space’ i.e. no physical connection medium such as


cable or fibre
Infra-red LEDs allow point-to-point optical commnciations
Infra-red LEDs allow high data rates using laser technology
Infra-red LEDs allow relatively inexpensive compared to other radio
technologies
Uses pulsing modulation/on-off signals which can restrict rates to low data
rates in free space
Suitable for short distance communication between devices (usually only
maximum of a few metres)
May not work relaibly when too close together
Line of sight required so objects block the signals
Not subject to interference as much as other radio technologies
Has low power requirements so suitable for use in small/mobile
devices/remote controls
Can be more secure than other radio technologies as range is low/easily
blocked by objects.
Max six for all positives or all negatives.
1 mark available for a resoned conclusion/opinion.

© UCLES 2018 Page 7 of 8


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

9(a) One from: 1

To ensure that the system requirements are valid


To ensure that the system requirements are understood by all
(Can be) quickest method of obtaining feedback from users about
(proposed) main features.

9(b) Two from: 2

Developers can be pressured into delivering unfinished product


Prototype may not work well enough so final product is never
made/produced/required
The time spent on the prototype is lost/cannot be used in development of
final product.

Question Answer Marks

10 Six from: 6

Running in one hotel until it is working perfectly


When working perfectly it can be installed in the other hotels
The method is more effective than installing in all hotels and discovering
problems
If it does not work only one hotel is affected not the whole chain of hotels
Staff at the hotel can be used to train staff at the other hotels
Feedback is collected and collating reviews by guests/users in one hotel
Will take longer to fully implement all guest access to Wi-Fi in all hotels
compared to direct changeover.

Question Answer Marks

11 Six from: 6

Observation is primary research so is valid/reliable


Observer can check the accuracy of the data themselves
Observation can be applied to almost any scenario where no verbal
responses are possible/obtainable
Observation does not require agreement of participants so no need for
observer to ask
People being observed do not have to give up time to answer questions/give
data
Observation is not effective for uncertain events as event may take place
when observer not present/blinks
Some events/phenomena cannot be observed...
...feelings/emotions are not observable so observation is ineffective
Observation is unreliable for social phenomena as bias by observer is
difficult to remove/compensate for
Observers need to have the technical knowledge of what they are observing
to be able to make valid observations of a process
Observation can be a slow method of research
Observation results are difficult to validate.

© UCLES 2018 Page 8 of 8


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 9 printed pages.

© UCLES 2018 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1(a) Two from: 2

Crop tool to remove excess background/to show just the face


Border line added to the whole image
Resize tool to make image larger
Saved as compressed (JPEG) format.

1(b) Six from: 6

The image in Fig. 1 has been created/saved as a bitmap


Bitmaps are made of pixels
The image in Fig. 2 has been saved as a compressed image with too
much compression
Loss of pixel/data during compression so detail is lost in the image of the
face
The compression artefacts are visible to the human eye
The pixels in Fig. 2 are no longer small enough to be indistinguishable by
the human eye
When enlarged the pixels of the face/image become visible
The face now looks unrealistic/blocky so the features are not
distinguishable.

Question Answer Marks

2 Eight from: 8

Symptom: The air conditioning does not work at all:


Check that the power supply is connected to the power outlet
Check that the power supply is on
Check if a fuse has blown/a circuit breaker has been tripped
Check if there has been a power failure/outage
Check that the timer is set correctly

Symptom: The air-conditioning is not working properly:


Check if the air intake is blocked/clear
Check if the air filter is dirty/clean
Check if the temperature has been set correctly
Check if there are any heaters on
Check if there are too many people in the room.

Checks must be related to symptom.

© UCLES 2018 Page 3 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)


Candidates will evaluate, giving advantages and disadvantages of, a range
of devices, in detail the use of Bluetooth® wireless technology for
communication between devices.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain, with advantages and disadvantages, the use of
Bluetooth ® wireless technology for communication between devices.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most
part correctly.

Level 1 (1–3 marks)


Candidates will describe the use of Bluetooth® wireless technology for
communication between devices.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Answers may make reference to e.g.


Bluetooth® has...
..a range of applications/uses for wireless communications between
devices like phones/ headsets/speakers/
..a range of applications/uses for control of communications between
devices

Advantages:
Bluetooth® requires minimal setup e.g. just a few button presses and
(possibly) a 4 digit code so is easy to use/setup or pair/bond devices c.f.
other network types
Bluetooth® is low energy technology so suitable for mobile devices
Bluetooth® is standardised so easy to implement/most devices will connect
readily
Bluetooth® is standard in a range of devices e.g. smartphones, speakers,
headsets
Bluetooth® is not easy to intercept nor will it easily interfere with other
device connections

© UCLES 2018 Page 4 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 Disadvantages:
Bluetooth® is short-range
Is affected by obstacles/walls that attenuate signals
Drains battery power if range is at maximum
Bluetooth® – enabled technology can be more expensive than non-enabled
devices
Bluetooth® has limited bandwidth.

Question Answer Marks

4 Six from: 6

Positional commands entered using GUI/text-based commands


Specify required X-Y-Z positions
‘Lead-by-the-nose’ method by one person holding the end-effector and
moving to positions...
...with recording of motions/positions
Off-line programming to input the positions as code
Mapping the positions in graphic format
Use of a ‘teach pendant’/hand-held control to move end-effectors and
program the positions at the same time
Robot simulation tools used to replicate and the positions/motion
Record the data for programming real robot.

Question Answer Marks

5(a) Stores multiple values in a single variable. 1

5(b) Containers for storing data values. 1

5(c) One from: 1

A block of code designed to perform a particular task


Code executed when it is invoked (called).

5(d) One from: 1

Text preceded by // is not executed/ignored by JavaScript


Used to explain the code
Used to halt execution of the code
Text that is not executed before a line of code
Text that is not executed at end of line of code.

5(e) One from: 1

A collection of variables and functions


Representing the attributes and behaviour of an ‘item’/‘thing’ being
modelled in a program.

© UCLES 2018 Page 5 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5(f) One from: 1

Any (valid) unit of code that resolves to a value


Two types of expression exist:
...........can have a value
...........can assign a value to a variable.

Question Answer Marks

6(a) Six from: 6

Installation of additional/two firewalls (to separate the servers from internal


network)
Installation of/configured a perimeter network/demilitarised zone/DMZ
DMZ can be physical or logical subnetwork
DMZ external node/computer system can only access the services in the
DMZ and not the internal LAN
The services accessible to external users are placed in the DMZ...
...email server and web server and FTP server
Services for internal use are kept behind internal firewall so not accessible
from the internet
External firewall is the perimeter/front end and allows traffic destined for
DMZ to pass
Internal firewall is configured to allow traffic from DMZ to enter company
LAN.

6(b) Four from: 4

The extra firewalls means that any attacker that gets past the first firewall
would have to get past the second to access the company LAN
An attacker could not be sure how many other firewalls would be found on
the network
One firewall is an external firewall and one is an internal firewall and could
have different security
The internal firewall security protects the data one LAN segment
The external firewall security only has to deal with data from the internet
The internal services are now protected by both firewalls.

Question Answer Marks

7(a) Two from: 2

Real-time collaboration/communication using web browsers between


multiple users via/using the internet/network
All users see the same screen at the same time in their web browsers
Collaborative interaction between users/webinars/webcasts.

© UCLES 2018 Page 6 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7(b) Six from: 6

Uses TCP/IP connections providing end-to-end data communication


(TCP/IP) specifies how data is put into packets and addressed...
...how it transmitted and routed
...how it is received
Can use point-to-point/circuit switching methods to provide a secure link
Point-to-point limits users to just two
Requires web-hosting services
Using HTTP/HTTPS as a protocol for transmission and display of data
Has a database server optimised for use by other services/mobile
applications
Use of FTP to upload/download data files
Use of IRC (internet relay chat) for text-based messaging
Application layer technology used also for file transfer.

Question Answer Marks

8 Eight from: 8

Face, hand geometry, and iris fit this parameter are easy to read
quickly/highly collectable at the door
Face, hand geometry, iris can be collected by machine/ computer system/
have a M/H
Fingerprint, facial thermogram, retina and iris have a M/H /highly unique to
individuals....
...but can be found in every individual
Iris, retina, voice and facial thermogram are acceptable to staff both in
original collection and use at the door...
...must not be intrusive/embarrassing when collected/read
parameter/have a M/H
Face, voice and DNA fit this parameter are difficult/not easy to circumvent
to prevent copying/use by several individuals
Fingerprint, retina, iris, DNA do not change over time/be permanent so
readings are repeatable
...facial thermogram is not permanent
Voice is most acceptable, but not very unique
Facial thermogram is unique, acceptable and easily collectable, but
changes over time so would need to be re-measured often
Fingerprint, Iris, Retina are most unique, collectable and accepted.

© UCLES 2018 Page 7 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

9(a) Six from: 6

Students can access/learn from the tutorial in their own time/have a


flexible schedule
Can study in own familiar/comfortable surroundings
Time is not wasted travelling to school/college/university
No travel costs incurred as no travelling
Students can often access/learn from the tutorial for free/no tuition fees
Motivation is increased/students can work at own pace/ask extra
questions/students feel empowered
Students have access to ‘live’ interaction with tutors/teachers
Students can have personalised/customised courses/tutorials.

9(b) Two from: 2

(Younger) students who are dependent on teachers for learning cannot


use online tutorial effectively
(Disabled/older/any) students might have difficulty with the technology
No access to the internet/computer/IT services due to cost/lack of IT
skills/expertise
Not enrolled on course/too many students using the tutorial at once.

Question Answer Marks

10 Eight from: 8

Voters can contact politicians/others with views/post views for others to


comment upon so increasing their influence on politicians/government
Extremist views/inaccurate/fake news can spread very easily

Can (re-)connect with friends very easily/more often


Can keep up to date with latest news/developments
Difficult to keep views/personal activities secret/private
Can become victim of e.g. cyber-bullying/victimisation
Have more ‘friends’
Become more isolated from family/less interaction with others so more
vulnerable to external influences/extreme views/radicalisation

Less likely to share private/personal/confidential details in case it is shared


widely
Less trusting of friends in case they share personal details/ inappropriate
images/conversations/facts
Personal details are published leading to vulnerability to identity theft
Background checks by prospective employers can check/reveal
(embarrassing) social media postings.

Max 6 for all positives or all negatives.


1 mark available for a reasoned conclusion/opinion.

© UCLES 2018 Page 8 of 9


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

11 Six from: 6

CAM can produce items quicker than manual machines due to higher
machining speeds
CAM shows greater consistency of product as every finished product is the
same
CAM can have higher production rate as it can run continuously without
much supervision
CAM can produce more elegant/sophisticated shapes with greater ease
than manual machining/methods
CAM is more expensive than manual machinery so adds to production
costs
Costs may be offset by greater efficiency in e.g. speed of
production/volume production
CAM programs/CNC can take a long time to produce
Need to be accurate/correct to ensure production of item is properly
carried out.

Question Answer Marks

12 Six from: 6

Tool that allows planning and executing a project from inception to


completion
Can provide tracking of workers/builders/who is doing what and when
Can show if anyone is missing deadlines
Can move tasks reschedule/around/interchange tasks
Allows flexibility to cope with e.g. unforeseen problems
Can allow resources to be sourced/allocated/delivered at appropriate times
Project scheduling tools can make simple projects more complex than they
need to be
Project scheduling tools can be expensive/costly for small projects.

© UCLES 2018 Page 9 of 9


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2018 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1 4
Peer-to-peer networks must have a central server.

Client-server networks generally offer greater security than peer- 3


to-peer networks.

Peer-to-peer networks can support millions of users with no loss


of performance.

The server will determine which users can access the files on a 3
client-server network.

In a client-server network each client functions both as a client


and as a server simultaneously.

If one computer crashes it has no effect on the other users in a 3


client-server network.

A client-server network is cheaper to set up than a peer-to-peer


network.

Peer-to-peer networks always require an employee to manage


the network.

In a peer-to-peer network only one computer is allowed the


printer.

In a peer-to-peer network computers can communicate and 3


share files with every other computer on the network.

© UCLES 2018 Page 3 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

2 4
The colours used in a dialogue interface are of key importance.

A mouse is an essential input device when using a command


line interface.

A graphical user interface requires you to type in a large number


of instructions.

A command line interface is mainly used by more advanced 3


computer users.

A gesture based interface allows users to point with their fingers 3


as a method of input.

A command line interface needs menus and icons to operate it.

A dialogue interface can interpret hand movements to carry out


commands.

A gesture based interface is very reliable as most users have 3


similar gestures for communicating.

The font size is the most important feature of a command line


interface.

A graphical user interface involves the use of windows and 3


pointers.

© UCLES 2018 Page 4 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 Eight from: 8

The purpose of storage devices is to store data and software for later use
The purpose of storage devices is to hold data even when the computer is
turned off so the data can be used whenever needed/to have non-
volatile/permanent/backup copies of data/keep archives
Stored data may be loaded back into the CPU for further processing or sent
to an output device
The device writes data to the medium and reads it from the medium
The CPU is able to write data to the hard disk/tape in the form of formatted
files
The CPU is also able to read data and software from the hard disk/tape in
readiness for processing to take place
There is no distinction between software and data as far as the storage
device is concerned – both are a form of digital data
Optical devices such as CD, DVD and Blu-Ray drives all make use of a
laser to burn dark pits onto the medium
Each dark pit is a binary digit e.g. 1 whilst the absence of a pit is the
opposite binary bit e.g. 0 if the pit is a 1
Small areas of a tape/disk are magnetised to represent 1 or 0
Hard disks and magnetic tape have surfaces coated with a magnetically
sensitive material such as iron oxide
Solid state drives make use of electrical charge to store the data
Reading data involves retrieving data from the surface and transferring it
into the computer’s memory for use.

Question Answer Marks

4 Six from: 6

Lack of understanding of the relevance and benefits of broadband


Lack of skills/education about/knowledge of/familiarity with information
technologies, or confidence to use them
Affordability of connection and access fees
Affordability of devices with which to access broadband
Tend to live in rural areas where broadband infrastructure is not as good as
in cities
Government programmes to implement education
Stimulate initiatives such as the development of e-government, e-health, e-
learning and e-business, aimed at encouraging the development and use of
new broadband applications
Extend faster broadband to rural areas.

© UCLES 2018 Page 5 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5 Four from: 4

It can be expensive to buy the software/bring in expertise


Sometimes there is not sufficient data to produce a mathematical model
The simulator response will not always be exactly the same as an actual
situation, as there may be too many variables
Complex simulations can require a computer system with a fast
processor/large amounts of memory which is very expensive
An event that may occur instantaneously in the real world may actually take
hours to imitate in a simulated environment
The reduction of simulation time may be based on oversimplification of
assumptions
Users may be given a false sense of security and not react well in the real
situation.

Question Answer Marks

6(a) Three from: 3

Easier for students to complete


Essential details can be pre-printed so easier to identify candidate
Faster to mark scripts
More accurate marking of scripts
Graphs/statistics are more easily produced.

6(b) Three from: 3

Students cannot express themselves as easily/OMRs cannot read


text/extended answers
Answers are not so easily human readable/harder for teacher to analyse
answers
Questions cannot be open ended/do not allow variety of answers
Equipment is expensive to purchase/setting up is expensive.

© UCLES 2018 Page 6 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7 Three matched pairs from: 6

Overloading sockets causing overheating and therefore fire


CO2 fire extinguisher in the room/separate sockets for each plug

Water spilt on to live wires/handling bare wires can cause electrocution


Do not allow food and drink into the computer room/keep computers away
from water supply/ensure regular inspection by electrician/ensure all wires
are properly insulated

Trailing cables can cause users to trip up and injure themselves


Ensure proper trunking is in place/keep cables under carpets/use Wi-Fi

Heavy objects can fall off tables and cause injury


Ensure sturdy desks or tables are used / heavy objects are placed in the
centre of tables.

1 mark for description of issue and 1 for prevention.

© UCLES 2018 Page 7 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

8 Two points from each section: 6

General public:
More people are able to use personal video-conferencing systems as
equipment/broadband has become affordable to the general public
More people are able to use personal video-conferencing systems as
hardware has improved in quality
Availability of freeware has made software-based video-conferencing
accessible to many
Enables more people to stay in contact with family/friends when far
apart/when it is difficult to travel
Hard-of-hearing/people with speech difficulties use video-conferencing as a
means of communicating with each other in sign language
Can result in loss of social interaction

Medicine:
Patients who are bed-ridden may contact nurses and physicians (to show
symptoms)
Doctors and/or other paramedical professionals can discuss cases across
large distances
Rural areas can use this technology for diagnostic purposes
Doctors can teach student doctors/student doctors can observe surgical
operations

Education:
Video-conferencing provides students with the opportunity to learn by
participating with students from other countries/schools
Teachers and lecturers worldwide can be virtually brought to remote or
otherwise isolated educational facilities
Students who are ill can still take part in lessons
Students from diverse communities and backgrounds can come together to
learn about one another
Through video-conferencing, students can virtually visit museums and
educational facilities
Universities with several campuses can collaborate and share lecturers.

Question Answer Marks

9(a) =IF(C4>500,(C4-500)*0.1,"") 5

=IF() – 1 mark
C4>500, – 1 mark
(C4-500) – 1 mark
*0.1 – 1 mark
,"" – 1 mark

© UCLES 2018 Page 8 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

9(b) =SUMIFS(E3:E14,C3:C14,">800",B3:B14,"Adults") 7

=SUMIFS() – 2 marks (SUMIF() – 1 mark) as first part of formula


E3:E14 as first part of bracketed formula – 1 mark
,C3:C14 – 1 mark
,">800" – 1 mark
,B3:B14 – 1 mark
,"Adults" – 1 mark

9(c) =COUNTBLANK(E3:E14) 2

COUNTBLANK() – 1 mark
E3:E14 – 1 mark

9(d) Five from: 5

Highlight columns A to G
Use format tool and column width tool and enter 20
Highlight column F, use format tool and column width tool and enter
12 / move cursor over right hand edge of letter F and drag to 12pt
Highlight cells C3:G16 and select format and format cells
Select currency
Choose symbol (format) $ and enter 0 for decimal places.

Question Answer Marks

10(a)(i) Reg_No = “L*” 2

Reg_No = – 1 mark
“L*” – 1 mark

10(a)(ii) Make = “Frod” AND Colour = “Blue” 2

Make = “Frod” – 1 mark


AND Colour = “Blue” – 1 mark

10(a)(iii) Model = “Eagle” AND NOT Colour = “Black” 3

Model = “Eagle” – 1 mark


AND NOT – 1 mark
Colour = “Black” – 1 mark

10(b) Two from: 2

Sorted on Doors descending«


«followed by sorted on Make ascending«
«followed by sorted on Reg_No ascending.

10(c) Reg_No – it has unique values/no duplicated values – 1 mark 2


There are 3 occurrences of BMS or other suitable example/2 2000s/2 7
doors/2 greens – 1 mark

© UCLES 2018 Page 9 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

11 Eight from: 8

Advantages:
Any change to one record which is needed can instantly be made to any
related records
The database does not have redundant data making the file size smaller so
less money needs to be spent on storage
There is no data duplication so there are fewer errors in the data
There is no data duplication so there is less chance of storing incorrect
copies of the data
Modifying a table is easier as there is less data to modify

Disadvantages:
A larger number of tables requires more relationships to be designed taking
more time
Making data atomic may not always be the best solution such as date of
birth can be separated into day, month and year but this may serve no
purpose
Data may be stored as codes rather than meaningful data making it difficult
for humans to read/level of detail can be lost
With more tables setting up queries can become more difficult
You can end up with more tables than an un-normalised database making it
difficult to keep track of data
May require greater expertise (which may need to be bought in).

© UCLES 2018 Page 10 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

12 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will discuss the importance of encoding data including the
advantages and disadvantages.
Candidates will explain the effectiveness of the main methods of
coding in detail.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will discuss the advantages and disadvantages of encoding
data.
Candidates will describe the main methods of encoding in detail.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will present advantages or disadvantages of encoding data.
Candidates will describe at least one method of encoding in detail.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.

Coding of data is the reducing the length of data


Encryption is the scrambling of data into meaningless groups of symbols
Codecs are hardware/software needed to convert data so that it can be
transmitted down communication lines

Coding:
speeds up data entry
uses less storage space
enables faster searching for data
increases the accuracy of data entry
data is easier to validate

coarsening of data – light blue/dark blue can both have same code
Is difficult to code value judgements
coding can obscure the meaning of the data

© UCLES 2018 Page 11 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

12 Encryption:
It allows protection of sensitive data such as credit card numbers and
personal information from computer hackers
Without encryption information could be intercepted and altered or misused
by outsiders
It can be used to create digital signatures to authenticate e-mail
If the encryption key is lost the data is effectively lost
Encrypting data and creating the keys necessary to encrypt and decrypt the
data requires expensive systems
Public key encryption is based on complicated mathematics so computers
have to work very hard to both encrypt and decrypt data using the system
making such systems very slow
Many systems use a third party to certify the reliability of public keys and if
the certification authority is compromised, the criminal that did it could issue
false certificates fooling people into sending data
Users can have a false sense of security forgetting that once the data is
decrypted it becomes vulnerable to attack again

Codecs:
Video and music files are large so are difficult to transfer across the Internet
quickly
Without codecs, downloads would take three to five times longer than they
do now

There are many different types of codec and it is not always clear which
codec to get to play the video/music files
It is common to need ten to twelve codecs to play a user's music and
movies
There is always loss of quality.

© UCLES 2018 Page 12 of 12


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 11 printed pages.

© UCLES 2018 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1 4
Verifying data is checking that data is correct.

Validating data is checking that data is correct.

Validation is the process of checking that the data entered into a


system is the same as the source data.

Visual verification is a type of verification. 3

A range check is an example of verification.

Validation is checking that data is sensible. 3

A range check is the best check to make sure transposition has not
occurred when typing in a bar code.

Visual validation is a type of validation.

Double data entry is a type of verification. 3

A type check will prevent a letter of the alphabet being typed into a 3
numeric field.

Question Answer Marks

2 4
A scanner can be both an input and output device.

A touch screen can be both an input and output device. 3

Input devices allow the user to communicate with the computer’s 3


operating system.

Output devices allow data to be stored electronically for future use.

Inputs must be converted to analogue data before they can be


processed by the computer.

All inputs come in the form of digital data.

A plotter is an output device 3

Outputs always come in the form of a printout.

A microphone is an input device. 3

A pen drive is an input device.

© UCLES 2018 Page 3 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 Trojan Horse: 8
Two from:

A malicious computer program which is used to hack into a computer by


misleading users of its true intent/disguises itself as authentic software
(unlike computer viruses and worms)
Trojans generally do not attempt to infect other files
They do not attempt to self-replicate themselves

Worm:
Two from:

A standalone malicious computer program that replicates itself in a


computer system
Many copies are then sent to other computers
Worms almost always cause some harm/slowing down to the network
even if only by consuming bandwidth

Spyware:
Two from:

Software designed to collect information about a computer user’s activities


Data such as passwords is passed to a remote server/attacker/hacker
(without the user’s knowledge)
A keylogger is a type of spyware (which collects a record of the user’s key
strokes)

Adware:
Two from:

Automatically generates advertisements in order to gain revenue for its


author
Advertisements may appear in the user interface/screen shown to the user
by the software
Examines which internet sites visited and presents advertising according to
the types of goods/services featured on these/usually the type of
goods/adverts the user is interested in.

Question Answer Marks

4(a) Three from: 3

Do not have to spend time learning HTML/do not have to be an expert/have


much experience/many skills to make a fully functional website
Most web authoring packages involve basically pointing and clicking to
create a web page rather than typing in instructions
It is more difficult to remember the various HTML codes for creating web
pages
Writing HTML would take much longer/it saves time when it comes to
creating content/establishing the layout/graphical elements of the page.

© UCLES 2018 Page 4 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

4(b) Three from: 3

It limits the user’s options as a designer


Such programs rely on templates with limited options for the look and feel of
the site
Depending on the type of software, user may not be able to implement video
or other common web-design elements
Software may make user completely reliant on it
... if the program suddenly becomes unavailable for some reason user
cannot create a website
Knowledge of HTML means web pages can be designed regardless of what
software is available/only needs a simple text editor.

Question Answer Marks

5 Four from: 4

Both provide representations of mathematical operations/equations


Both can involve the use of cell references within them
Both are not visible in csv format

A function is also a formula, but the parts have been predefined by the
spreadsheet software
Formulae can be as simple or as complex as the user wants
Instead of having to accurately type out the details of the formula a function
acts as a shortcut to carry them out
A formula can contain a function, but it is possible to write a formula without
a function
A function is provided by the spreadsheet software
Most functions have criteria, but not always as with RAND()
A formula is something that is user-created and can include spreadsheet
functions

For example, =C3-D2 is a formula


For example, AVERAGE() is a function

Must have at least one similarity and one example to gain full marks.

© UCLES 2018 Page 5 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

6 Four from: 4

Developers can be freer to test all of the aspects of the machine without
worrying about damaging an expensive machine
Can provide results that are generally not measurable in some experiments
(e.g. all weather conditions)
Computer simulation can allow you to see how a system might respond
before you design or modify it, thus avoiding mistakes
It is cheaper as there is no need to make different prototypes to test them
out
It is safer to use a model and simulation for nuclear power plants/learning to
drive/fly
Designing an item as a model on a computer before the real item is built
saves time
Models allow accurate prediction of changes in trends or patterns
Critical situations can be investigated without risk
Critical situations can be created more quickly
Can be slowed down to study behaviour more closely.

Question Answer Marks

7(a) Two from: 3

Asymmetric/asynchronous digital subscriber line


Bandwidth and bit rate is greater toward the subscriber/downstream than
the reverse/upstream hence asymmetric/asynchronous
ISPs usually provide ADSL as a service for consumers to receive Internet
access in a relatively passive mode

The maximum reliable speed which could be achieved is usually lower than
that which modern video-conferencing systems require. 1 mark

7(b) Two from: 3

Symmetric/synchronous digital subscriber line


Bandwidth and bit rate in the downstream direction/from the network to the
subscriber is identical to the bandwidth in the upstream direction/from the
subscriber to the network
SDSL is generally aimed at business customers/ADSL is marketed at
private as well as business customers

SDSL is more expensive than ADSL but a better choice for high-quality
video-conferencing as allows much higher bandwidth. 1 mark

© UCLES 2018 Page 6 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7(c) Two from: 3

Integrated Services Digital Network


Allows simultaneous digital transmission of voice, video, data, other network
services over public switched telephone network
Circuit-switched telephone network system which also provides access to
packet switched networks
Results in potentially better voice quality than an analogue phone can
provide

One from:

ISDN video-conferencing systems still in use as high-definition is achievable


using a Primary Rate Interface (PRI)
Is very cost prohibitive and can achieve the same results with SDSL for a lot
less.

Question Answer Marks

8(a) Check digit check for transposed digits in A7 – 1 mark 8


67 instead of 76 would have resulted in a different check digit being
calculated – 1 mark

Type check to check for invalid characters in A10 – 1 mark


xy would register as text in a numeric field – 1 mark

Length check to check exact number of characters entered in A16 –


1 mark
Would have registered that only 10 characters entered – 1 mark

Format check to check that correct format has been followed in B10 –
1 mark
Would have trapped two letters and two digits entered instead of one letter
followed by three digits – 1 mark

8(b) =VALUE(LEFT(A2,3)) 4

VALUE() – 1 mark
LEFT(A2, 3) – 1 mark

Two from:

Highlight D2 and select format (format cells)/right click and select format
cells
Select currency
Set to $ and 2 decimal places.

© UCLES 2018 Page 7 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

9 Five from: 5

Table name – a unique name for each table in a database


Field name – to identify each field
The data type allocated to each field – e.g. text, numeric, Boolean
Field length – the number of characters in each field
Field default value, where present, is the value automatically entered in that
field when a new record is created
Validation – the validation check applied to each field
Table security –
Keys – primary keys are identified
Relationships – relationships between tables are stated – one to one, one to
many.

Question Answer Marks

10(a) Cars: 10
Field1 Field2 Field3 Field4 Field5

Car ID Make Model Agent ID Showroom ID

Award one mark for two correct fields, two marks for three correct fields,
three marks for four correct fields, four marks for five correct fields

Agents:
Field1 Field2 Field3 Field4

Agent ID Agent first name Agent second Agent Email


name

Award one mark for each correct field

Showrooms:
Field1 Field2 Field3

ShowroomID Showroom District

Award one mark for two correct fields, two marks for three correct fields.

© UCLES 2018 Page 8 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

10(b) 8
Agents Showrooms
Agent ID PK 1 1 Showroom ID PK
Agent first name Showroom
Agent second name District
Agent email
Cars
Car ID PK
Make
Model
∞ Agent ID FK
ShowroomID ∞
FK

Maximum 8 from:

1 mark for each correct relationship (2)


1 mark each for identifying one to many (2)
1 mark for each correct primary key (3)
1 mark for each correct foreign key (2)

© UCLES 2018 Page 9 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

11 Level 3 (7–8 marks) 8


Candidates will discuss the importance of RAM, ROM and hard disks
including the advantages and disadvantages.
Candidates will explain the effectiveness of these items in detail.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will discuss the advantages and disadvantages of RAM, ROM
and hard disks.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will present an advantage or disadvantage of two of RAM, ROM
and hard disks.
Candidates will describe at least one of these items.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to for e.g.


RAM / ROM allows quicker access to data than HDD
HDD or the Hard Disk Drive stores information for permanent storage/long
term whereas RAM only stores information for relatively short-term usage
Data in RAM is deleted once the power to the device is stopped
RAM stores active program data whereas ROM is unable to
RAM stores data that the user is currently working on whereas ROM is
unable to
Large RAM chips can be read faster than most ROMs ...
... ROM content is sometimes copied to RAM and subsequently read from
RAM

Hard disks can be portable and easy to move from device to device unlike
ROM/RAM
Data in RAM can be accessed much faster than the data on a hard disk
Hard disk drives are electromechanical devices and more prone to failure
than RAM/ROM – no moving parts
In a normal computer configuration RAM size is much smaller than the hard
disk size

ROM cannot be changed by a program or user


ROM/HDD retains its data even after the computer is turned off
ROM stores the instructions for the computer to start up when it is turned on
again
Would be expensive to save an operating system on ROM so need hard
disk
Still need to have boot up instructions to activate hard disk drive so ROM is
needed.

© UCLES 2018 Page 10 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

12 Eight from: 8

Advantages:
Cost of buying a server is saved
does not need a server because individual workstations are used to
access the files
No need to pay for System Administrator/network technicians because each
user sets their own permissions as to which files they are willing to share
Much easier to set up than a client-server network as it does not need
specialist knowledge
The over-all cost of building and maintaining this type of network is
comparatively cheaper
If one computer fails it will not disrupt any other part of the network except
the files on that computer are not available to other users at that time/in
client-server network, if server goes down whole network gets affected

Disadvantages:
Files and folders are difficult to recover as they cannot be centrally backed
up/each computer has to have its own back-up system
Files and resources are more difficult to share
There is less security other than permissions/users often do not need to log
onto their workstations.
The system is not centralised so it is difficult to administer/one person
cannot determine the accessibility setting of whole network
Each computer is fulfilling more than one role, it may be printing or file
sharing so performance can be slower
Security is more expensive as each computer must have its own anti-virus
scanner
Difficult to have more than a few users
If sharing a large database which increases in size computers would need to
increase their storage capacity/client-server which only needs to upgrade
server
Because each computer might be being accessed by others it can slow
down the performance for the user unlike client-server
Ensuring that viruses are not introduced to the network it is the responsibility
of each individual user/client-server has central virus protection distributed
to each computer.

© UCLES 2018 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2018
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2018 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2018 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2018 Page 2 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

1 4
Peer-to-peer networks must have a central server.

Client-server networks generally offer greater security than peer- 3


to-peer networks.

Peer-to-peer networks can support millions of users with no loss


of performance.

The server will determine which users can access the files on a 3
client-server network.

In a client-server network each client functions both as a client


and as a server simultaneously.

If one computer crashes it has no effect on the other users in a 3


client-server network.

A client-server network is cheaper to set up than a peer-to-peer


network.

Peer-to-peer networks always require an employee to manage


the network.

In a peer-to-peer network only one computer is allowed the


printer.

In a peer-to-peer network computers can communicate and 3


share files with every other computer on the network.

© UCLES 2018 Page 3 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

2 4
The colours used in a dialogue interface are of key importance.

A mouse is an essential input device when using a command


line interface.

A graphical user interface requires you to type in a large number


of instructions.

A command line interface is mainly used by more advanced 3


computer users.

A gesture based interface allows users to point with their fingers 3


as a method of input.

A command line interface needs menus and icons to operate it.

A dialogue interface can interpret hand movements to carry out


commands.

A gesture based interface is very reliable as most users have 3


similar gestures for communicating.

The font size is the most important feature of a command line


interface.

A graphical user interface involves the use of windows and 3


pointers.

© UCLES 2018 Page 4 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

3 Eight from: 8

The purpose of storage devices is to store data and software for later use
The purpose of storage devices is to hold data even when the computer is
turned off so the data can be used whenever needed/to have non-
volatile/permanent/backup copies of data/keep archives
Stored data may be loaded back into the CPU for further processing or sent
to an output device
The device writes data to the medium and reads it from the medium
The CPU is able to write data to the hard disk/tape in the form of formatted
files
The CPU is also able to read data and software from the hard disk/tape in
readiness for processing to take place
There is no distinction between software and data as far as the storage
device is concerned – both are a form of digital data
Optical devices such as CD, DVD and Blu-Ray drives all make use of a
laser to burn dark pits onto the medium
Each dark pit is a binary digit e.g. 1 whilst the absence of a pit is the
opposite binary bit e.g. 0 if the pit is a 1
Small areas of a tape/disk are magnetised to represent 1 or 0
Hard disks and magnetic tape have surfaces coated with a magnetically
sensitive material such as iron oxide
Solid state drives make use of electrical charge to store the data
Reading data involves retrieving data from the surface and transferring it
into the computer’s memory for use.

Question Answer Marks

4 Six from: 6

Lack of understanding of the relevance and benefits of broadband


Lack of skills/education about/knowledge of/familiarity with information
technologies, or confidence to use them
Affordability of connection and access fees
Affordability of devices with which to access broadband
Tend to live in rural areas where broadband infrastructure is not as good as
in cities
Government programmes to implement education
Stimulate initiatives such as the development of e-government, e-health, e-
learning and e-business, aimed at encouraging the development and use of
new broadband applications
Extend faster broadband to rural areas.

© UCLES 2018 Page 5 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

5 Four from: 4

It can be expensive to buy the software/bring in expertise


Sometimes there is not sufficient data to produce a mathematical model
The simulator response will not always be exactly the same as an actual
situation, as there may be too many variables
Complex simulations can require a computer system with a fast
processor/large amounts of memory which is very expensive
An event that may occur instantaneously in the real world may actually take
hours to imitate in a simulated environment
The reduction of simulation time may be based on oversimplification of
assumptions
Users may be given a false sense of security and not react well in the real
situation.

Question Answer Marks

6(a) Three from: 3

Easier for students to complete


Essential details can be pre-printed so easier to identify candidate
Faster to mark scripts
More accurate marking of scripts
Graphs/statistics are more easily produced.

6(b) Three from: 3

Students cannot express themselves as easily/OMRs cannot read


text/extended answers
Answers are not so easily human readable/harder for teacher to analyse
answers
Questions cannot be open ended/do not allow variety of answers
Equipment is expensive to purchase/setting up is expensive.

© UCLES 2018 Page 6 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

7 Three matched pairs from: 6

Overloading sockets causing overheating and therefore fire


CO2 fire extinguisher in the room/separate sockets for each plug

Water spilt on to live wires/handling bare wires can cause electrocution


Do not allow food and drink into the computer room/keep computers away
from water supply/ensure regular inspection by electrician/ensure all wires
are properly insulated

Trailing cables can cause users to trip up and injure themselves


Ensure proper trunking is in place/keep cables under carpets/use Wi-Fi

Heavy objects can fall off tables and cause injury


Ensure sturdy desks or tables are used / heavy objects are placed in the
centre of tables.

1 mark for description of issue and 1 for prevention.

© UCLES 2018 Page 7 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

8 Two points from each section: 6

General public:
More people are able to use personal video-conferencing systems as
equipment/broadband has become affordable to the general public
More people are able to use personal video-conferencing systems as
hardware has improved in quality
Availability of freeware has made software-based video-conferencing
accessible to many
Enables more people to stay in contact with family/friends when far
apart/when it is difficult to travel
Hard-of-hearing/people with speech difficulties use video-conferencing as a
means of communicating with each other in sign language
Can result in loss of social interaction

Medicine:
Patients who are bed-ridden may contact nurses and physicians (to show
symptoms)
Doctors and/or other paramedical professionals can discuss cases across
large distances
Rural areas can use this technology for diagnostic purposes
Doctors can teach student doctors/student doctors can observe surgical
operations

Education:
Video-conferencing provides students with the opportunity to learn by
participating with students from other countries/schools
Teachers and lecturers worldwide can be virtually brought to remote or
otherwise isolated educational facilities
Students who are ill can still take part in lessons
Students from diverse communities and backgrounds can come together to
learn about one another
Through video-conferencing, students can virtually visit museums and
educational facilities
Universities with several campuses can collaborate and share lecturers.

Question Answer Marks

9(a) =IF(C4>500,(C4-500)*0.1,"") 5

=IF() – 1 mark
C4>500, – 1 mark
(C4-500) – 1 mark
*0.1 – 1 mark
,"" – 1 mark

© UCLES 2018 Page 8 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

9(b) =SUMIFS(E3:E14,C3:C14,">800",B3:B14,"Adults") 7

=SUMIFS() – 2 marks (SUMIF() – 1 mark) as first part of formula


E3:E14 as first part of bracketed formula – 1 mark
,C3:C14 – 1 mark
,">800" – 1 mark
,B3:B14 – 1 mark
,"Adults" – 1 mark

9(c) =COUNTBLANK(E3:E14) 2

COUNTBLANK() – 1 mark
E3:E14 – 1 mark

9(d) Five from: 5

Highlight columns A to G
Use format tool and column width tool and enter 20
Highlight column F, use format tool and column width tool and enter
12 / move cursor over right hand edge of letter F and drag to 12pt
Highlight cells C3:G16 and select format and format cells
Select currency
Choose symbol (format) $ and enter 0 for decimal places.

Question Answer Marks

10(a)(i) Reg_No = “L*” 2

Reg_No = – 1 mark
“L*” – 1 mark

10(a)(ii) Make = “Frod” AND Colour = “Blue” 2

Make = “Frod” – 1 mark


AND Colour = “Blue” – 1 mark

10(a)(iii) Model = “Eagle” AND NOT Colour = “Black” 3

Model = “Eagle” – 1 mark


AND NOT – 1 mark
Colour = “Black” – 1 mark

10(b) Two from: 2

Sorted on Doors descending«


«followed by sorted on Make ascending«
«followed by sorted on Reg_No ascending.

10(c) Reg_No – it has unique values/no duplicated values – 1 mark 2


There are 3 occurrences of BMS or other suitable example/2 2000s/2 7
doors/2 greens – 1 mark

© UCLES 2018 Page 9 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

11 Eight from: 8

Advantages:
Any change to one record which is needed can instantly be made to any
related records
The database does not have redundant data making the file size smaller so
less money needs to be spent on storage
There is no data duplication so there are fewer errors in the data
There is no data duplication so there is less chance of storing incorrect
copies of the data
Modifying a table is easier as there is less data to modify

Disadvantages:
A larger number of tables requires more relationships to be designed taking
more time
Making data atomic may not always be the best solution such as date of
birth can be separated into day, month and year but this may serve no
purpose
Data may be stored as codes rather than meaningful data making it difficult
for humans to read/level of detail can be lost
With more tables setting up queries can become more difficult
You can end up with more tables than an un-normalised database making it
difficult to keep track of data
May require greater expertise (which may need to be bought in).

© UCLES 2018 Page 10 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

12 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will discuss the importance of encoding data including the
advantages and disadvantages.
Candidates will explain the effectiveness of the main methods of
coding in detail.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will discuss the advantages and disadvantages of encoding
data.
Candidates will describe the main methods of encoding in detail.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a conclusion/opinion.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will present advantages or disadvantages of encoding data.
Candidates will describe at least one method of encoding in detail.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.

Coding of data is the reducing the length of data


Encryption is the scrambling of data into meaningless groups of symbols
Codecs are hardware/software needed to convert data so that it can be
transmitted down communication lines

Coding:
speeds up data entry
uses less storage space
enables faster searching for data
increases the accuracy of data entry
data is easier to validate

coarsening of data – light blue/dark blue can both have same code
Is difficult to code value judgements
coding can obscure the meaning of the data

© UCLES 2018 Page 11 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2018

Question Answer Marks

12 Encryption:
It allows protection of sensitive data such as credit card numbers and
personal information from computer hackers
Without encryption information could be intercepted and altered or misused
by outsiders
It can be used to create digital signatures to authenticate e-mail
If the encryption key is lost the data is effectively lost
Encrypting data and creating the keys necessary to encrypt and decrypt the
data requires expensive systems
Public key encryption is based on complicated mathematics so computers
have to work very hard to both encrypt and decrypt data using the system
making such systems very slow
Many systems use a third party to certify the reliability of public keys and if
the certification authority is compromised, the criminal that did it could issue
false certificates fooling people into sending data
Users can have a false sense of security forgetting that once the data is
decrypted it becomes vulnerable to attack again

Codecs:
Video and music files are large so are difficult to transfer across the Internet
quickly
Without codecs, downloads would take three to five times longer than they
do now

There are many different types of codec and it is not always clear which
codec to get to play the video/music files
It is common to need ten to twelve codecs to play a user's music and
movies
There is always loss of quality.

© UCLES 2018 Page 12 of 12


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 7 8 1 1 6 3 2 1 2 0 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name on all the work you hand in.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Calculators must not be used on this paper.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (SC/TP) 163073/3
© UCLES 2019 [Turn over
2

1 Tick the four most accurate statements regarding solid state drives (SSDs), hard disk
drives (HDDs), magnetic tape drives and their associated media.

Hard disks are metal platters with a magnetic coating that stores data

Hard disk drives have no moving parts and so are not at risk of being damaged

Magnetic tape drives can have almost instantaneous data access

SSDs have a faster data transfer rate than magnetic tape drives

Magnetic tape uses direct access to search for data

Magnetic tapes are used in laptop computers more than hard disks

SSDs store considerably more data than magnetic tapes

SSDs still cost more per gigabyte than hard disk drives

SSDs make more noise than the sound of hard disk drives when in use

Magnetic tapes are used to store backups of data on file servers


[4]

2 Tick the four most accurate statements regarding control and monitoring systems and
the use of sensors.


A temperature sensor is able to directly control the temperature of water in a
washing machine
A pressure sensor is often used to monitor the amount of pollution in a river

A moisture sensor is used to monitor the pollution in a river

A humidity sensor is often used in a computerised weather station


Microprocessors are unable to directly read the analogue data produced by a
sensor
In order to control physical variables, microprocessors send signals to actuators
to take action
Passive sensors produce both input and output

A weather station is an example of a control system


An air conditioning system is an example of a control system where the output
affects the input
Monitoring systems never need sensors to input data
[4]

© UCLES 2019 9626/13/M/J/19


3

3 Using a printed newspaper as an example, describe what is meant by static data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

4 The quality of a sound recording when processed by audio editing software depends on the
sampling resolution of the recording.

Describe, using examples, what is meant by sampling resolution and explain how it affects audio
file sizes.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2019 9626/13/M/J/19 [Turn over


4

5 A headteacher is updating the school’s record-keeping system. For the new system he is
considering using off-the-shelf software. When the new system is running the secretary will need
to enter all the students’ data. This will require accurate entry of the data.

(a) Define what is meant by the term ‘software’ and describe, giving examples of each, application
and system software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

(b) Describe the benefits of using off-the-shelf software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2019 9626/13/M/J/19


5

(c) Describe the drawbacks of using off-the-shelf software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(d) Describe the different methods of verification the secretary could use.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2019 9626/13/M/J/19 [Turn over


6

6 Spreadsheets are commonly used to create models of real situations.

Using examples, explain why the characteristics of spreadsheets are suitable for producing
financial models.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/13/M/J/19


7

7 The encoding of data can often require the use of codecs.

Describe the features of this type of encoding.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2019 9626/13/M/J/19 [Turn over


8

8 A car hire company keeps its records in a database consisting of two tables. Parts of these tables
are shown below.

Customer Table

CustomerID FamilyName FirstName Phone Residence


11106 Akula Angela 01164 960567 Midtown
12481 Onyancha Udoka 08081 960965 Cheswick
12675 Smith Wesley 07700 900863 Portlarne
12934 Hall Lauren 01134 960675 Chorlton
12943 Green Billy 01164 960001 Midtown
13296 Jones Trevor 01134 990694 Chorlton
13478 Weston Wally 07700 900900 Portlarne
13542 Gunn Jasmine 08081 570945 Cheswick
14632 Wells Brian 09098 790142 Larrowby
15692 Williams Ieuan 01164 960836 Midtown
15732 Vercoe John 09098 980487 Larrowby

Car Table

ID Make Model Engine Licence Price Rental CustId


1 Olep Victor 1.8 VSE 648 €19,000 €54 12481
2 Olep Victor 1.8 VTF 384 €19,000 €54 13478
3 Olep Fariza 2 BFK 297 €29,000 €63 15692
4 Folkwagon Cricket 1.4 SB A5526 €15,000 €43 14632
5 Folkwagon Cricket 1.4 SA V4428 €15,000 €43 13296
6 Folkwagon Swim 1.2 DD B4978 €11,000 €37 15732
7 Folkwagon Swim 1.2 DD C8634 €11,000 €37 12934
8 Folkwagon Piano 1.6 B G8347 €19,000 €49 11106
9 Ranolt Melanie 1.4 12333 CD 33 €17,000 €41 12943
10 Ranolt Laine 1.2 6289 XF 54 €11,000 €33 13542
11 Ranolt Laine 1.2 6301 YU 38 €11,000 €33 12675

© UCLES 2019 9626/13/M/J/19


9

(a) Describe how you would use database features to create a relational database from these
two tables.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

(b) The manager is carrying out a survey of cars hired in certain areas. She wishes to know
which cars with an engine size under 1.8 litres have been rented by people living in the
Chorlton area. She only wishes to know the full names of the customers, their phone number
and the make of the car.

Complete the grid below to show how the conditions for such a query would be created.

Field:
Table:
Sort:
Show:
Criteria:
or:

[6]

© UCLES 2019 9626/13/M/J/19 [Turn over


10

(c) Explain why it would be extremely difficult to validate the Licence field. Include in your
explanation, a detailed description of three validation checks, other than a presence check,
which could normally be used on any alphanumeric field from the database shown on page 8.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[6]

© UCLES 2019 9626/13/M/J/19


11

9 Below is a spreadsheet of a company’s balance sheet. It shows its expenditure, income and profit
for each year between 2009 and 2018.

A B C D E F G H I J K L M
1
2 Expenditure

Total
3 Wages Utilities Stock expenditure Income Profit
4 2009 350250 54565 475623 €880,438 €925,365 €44,927 very bad year
5 2010 467032 61022 519429 €1,047,483 €1,097,652 €50,169 bad year
6 2011 476414 68124 567178 €1,111,716 €1,185,858 €74,142 bad year
7 2012 512209 75936 619224 €1,207,369 €1,342,020 €134,651 good year
8 2013 553156 84530 675954 €1,313,640 €1,518,483 €204,843 good year
9 2014 648589 93983 737790 €1,480,362 €1,717,886 €237,524 good year
10 2015 732877 104381 805191 €1,642,449 €1,943,211 €300,762 good year
11 2016 774954 115819 878658 €1,769,431 €2,197,828 €428,397 good year
12 2017 838925 128401 958737 €1,926,063 €2,485,546 €559,483 good year
13 2018 868577 142241 1046023 €2,056,841 €2,810,667 €753,826 good year
14
15 >2011 <2017
16
Variable
17 average 644357
18

(a) Write down the formula which uses a function, in cell G4, to calculate the Total expenditure
for 2009.

= ............................................................................................................................................[1]

(b) The percentage profit is calculated by dividing the Profit by the Income. The company
secretary has entered a formula in M4 which displays a message:

• very bad year, if Income was less than €1,000,000


• bad year, if the company’s percentage profit was less than 10%
• good year, if the percentage profit was not less than 10%

Write down the formula he used in cell M4 which would be replicated in cells M5 to M13.

= ................................................................................................................................................

...............................................................................................................................................[6]

You can use the space below for any working you need.

© UCLES 2019 9626/13/M/J/19 [Turn over


12

(c) The manager wants to be able to find the Variable average of the wages bill for any sequence
of years between 2009 and 2018.
He has set up the spreadsheet to calculate the average between 2011 and 2017.
To calculate the average between any other sequence of years he will just change the
conditions >2011 and <2017.

Write down the formula he will need to use in C17 to calculate the Variable average.

= ................................................................................................................................................

...............................................................................................................................................[6]

You can use the space below for any working you need.

© UCLES 2019 9626/13/M/J/19


13

10 Discuss the advantages and disadvantages of client-server and peer-to-peer networks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/13/M/J/19 [Turn over


14

11 A business needs to search its database to find all the customers it has in the Chinese city of
Beijing.

Analyse when static or dynamic parameters should be used in queries.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/13/M/J/19


15

BLANK PAGE

© UCLES 2019 9626/13/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/13/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 3 4 9 0 6 0 3 3 6 *

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (NF/CT) 180077
© UCLES 2019 [Turn over
2

1 Explain, with suitable examples, why computer graphics image editing software allows users to
save bitmap images in different file formats.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/M/J/19


3

2 In JavaScript code, the sort() function is used to sort lists into ascending order.

(a) Explain, in detail, why, when using the sort() function, the list in Fig. 2.1 is sorted correctly, but
the list in Fig. 2.2 is not.

Before sorting After sorting Before sorting After sorting

fly ant 1345 1111


cockroach beetle 3666 12
ant butterfly 1111 1345
butterfly cockroach 23 23
moth fly 37 3666
beetle moth 12 37

Fig. 2.1 Fig. 2.2

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Write a line of JavaScript code that could be used to sort the list of insects in Fig. 2.1 into
descending order.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/31/M/J/19 [Turn over


4

3 An online retailer uses a simple form on its website to enable customers to contact its After Sales
department by email. The form looks like this:

Send an email to aftersales@mycompany.com:


Your Name:

Your email address:

Comment:

Send Reset

Some of the code that created the form is shown.


Note that the lines have been numbered only for your convenience and reference.

1 <html>
2 <body>
3
4 <h2>Send an email to aftersales@mycompany.com:</h2>
5
6 <form action="mailto: aftersales@mycompany.com" method="post"
enctype="text/plain">
7
8 Your Name:<br>
9
10 Your email address:<br>
11
12 Comment:<br>
13
14
15
16 </form>
17 </body>
18 </html>
19
20

© UCLES 2019 9626/31/M/J/19


5

(a) Explain what the different parts of the code in line 6 do.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Create some additional lines of code that could be inserted into the script at appropriate
locations to collect the name and email address of the customer. Indicate, with reference to
the line numbers, where your additional code should be inserted.

Line number Code

[4]

© UCLES 2019 9626/31/M/J/19 [Turn over


6

(c) Write down the code that would allow:

• the comment to be entered


• the form to be submitted
• the form to be reset.

Indicate which line numbers the codes would appear on.

Line number Code

[6]

© UCLES 2019 9626/31/M/J/19


7

4 (a) Describe the drawbacks of storing company data in the ‘cloud’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Describe two benefits to a company of storing data in the ‘cloud’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/31/M/J/19 [Turn over


8

5 Describe how data is transmitted using fibre optic technology.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/M/J/19


9

6 Discuss the impact of photo editing in politics.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/M/J/19 [Turn over


10

7 The manager of a company has decided to contact existing customers to gather detailed feedback
about a product. She needs responses from a large number of customers as quickly as possible.

Use the information given in Fig. 7.1 to select, with reasons, the most appropriate method of
asking the customers for their feedback.

Administered by:
Criteria
Post Telephone Email In person

High response rate 3 3

High speed of return of results 3 3

Highly detailed questions possible 3 3

Low cost 3 3

Rapport between manager and respondents 3 3

Short time of manager involvement 3 3

Fig. 7.1

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/31/M/J/19


11

8 An online store sells goods through its website. The website has an ‘automated online assistant’ to
help the customer through the purchasing process. An ‘automated online assistant’ on a website
is a computer program that uses artificial intelligence to provide a customer with service and
assistance.

(a) Describe how the components of an ‘automated online assistant’ provide help to the customer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 9626/31/M/J/19 [Turn over


12

(b) Explain two benefits of the use of an ‘automated online assistant’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

9 Evaluate the use of physical security in combatting IT crime.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]
© UCLES 2019 9626/31/M/J/19
13

10 A typical animation has 24 frames for every second of running time (24 fps).

A bouncing ball drawn on ‘twos’ is shown on this timeline:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Frame number

(a) Explain why the ball is drawn on ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Suggest one reason why the animator might choose to draw the animation on ‘ones’ instead
of ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Describe the effect of drawing the ball in this animation on ‘fours’ instead of ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 9626/31/M/J/19 [Turn over


14

11 Discuss the impact of wearable computers in manufacturing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/M/J/19


15

12 Analyse the use of virtual reality in healthcare.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/31/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 2 5 4 7 6 0 3 4 7 3 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (SC/CB) 172052/1
© UCLES 2019 [Turn over
2

1 (a) Describe how the features of a 4G cellular communications system improve the ability of a
smartphone to complete the download of a video file from the internet.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) 5G cellular communications systems promise significant improvements compared to 4G.

Describe two ways that these improvements may affect the use of smartphones.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[2]

© UCLES 2019 9626/32/M/J/19


3

2 Lasers can be used to create a data link between devices without using cables.

(a) Describe two applications for this method of data transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe one drawback of this method of data transmission.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 9626/32/M/J/19 [Turn over


4

3 An author has written the source code of a web page that will be used when a person applies for a
driving licence. The code, shown in Fig. 3.1, is intended to check that a person is at least 16 years
of age.

The lines of the code are numbered only for your convenience when referring to the code.
The JavaScript code is in lines 8 to 19.

1 <html>
2 <body>
3 <p>You can apply for a licence to drive when you are 16 years
old.</p>
4 <p>To check if you are old enough to drive, input your age and
click the button:</p>
5 <input id="AgeNow" value="16" />
6 <button onclick="CheckAgFunction()">Check now</button>
7 <p id="AgeCheck"></p>
8
9 function CheckAgeFunction()
10 var AgeNow;
11 AgeNow = Number(document.getElementById("AgeNow").value);
12 if (isNaN(AgeNow)) {
13 CanApply = "Please enter your age in numbers.";
14 } else {
15 CanApply = (AgeNow >15)? "You are too young to apply
for a licence.": "You are old enough to apply for a licence.";
16 }
17 document.getElementById("AgeCheck).innerHTML = CanApply;
18 }
19
20 </body>
21 </html>

Fig. 3.1

Testing has shown that the code contains a number of errors of different types which must be
corrected before the code will perform as expected.

© UCLES 2019 9626/32/M/J/19


5

Identify the line numbers containing the errors. Explain why each of the errors prevents the code
from running correctly and how each should be corrected. Use the table for your response.

Line number of error and explanation of Explanation of suggested correction.


error.

[8]

© UCLES 2019 9626/32/M/J/19 [Turn over


6

4 Analyse the use of focus groups as a method of gathering feedback about a new product before it
is made available for sale.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/M/J/19


7

5 Fig. 5.1 shows a table of tasks for a building project. The tasks F, G, H, I, J and K, need to be
carried out between the stages A, B, C, D and E. The project starts with stage A and ends with
stage E. Stages B and C are milestones.

Time (months)
Task taken to Milestones
complete task
Task starts at Task ends at
F 4 A C
G 5 A B
H 3 B E
I 2 C D
J 3 D E
K 3 C E

Fig. 5.1

(a) (i) Draw an activity network diagram to represent the data in the table shown in Fig. 5.1.

[5]

(ii) Calculate the critical path through the tasks.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9626/32/M/J/19 [Turn over


8

6 A packet switched network has routers at nodes labelled A, B, C, D, E, F, G and H. Each router
stores its own ‘routing table’ which shows how it is connected to the other routers.

Router Connected to routers:


A B
B A C D
C B D E F
D B C F
E C F
F C D E G
G F H
H G

(a) Complete the diagram by drawing routers C, D, E, F and G with connection lines to show how
the routers are inter-connected to communicate with each other.

A B H

[3]

Router A regularly sends out packets to check that router H is reachable. When H receives a
packet from A it sends a packet back to confirm that it is reachable.

Assume that each router takes zero time units to receive, process and resend a packet and that
each packet takes six time units to travel from one router to the next.

© UCLES 2019 9626/32/M/J/19


9

(b) (i) Describe the shortest route that a packet can take from router A to router H.

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [1]

(ii) Calculate the shortest time taken for router A to receive an acknowledgement from router
H confirming that H is reachable.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(c) (i) Assuming that the packets visit each router only once, calculate the longest time it could
take for router A to receive an acknowledgement from router H confirming that H is
reachable.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(ii) Describe the route that the packets would take.

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [1]

(d) An additional router, J, is to be added to reduce the time for packets to travel from router A
to router H to a minimum. However, no further connections can be directly made to routers A
and H.

(i) Describe where J would be placed to reduce the travel time to a minimum.

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [1]

© UCLES 2019 9626/32/M/J/19 [Turn over


10

(ii) Calculate the new minimum time that it would take for A to receive an acknowledgement
that H was reachable.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

7 Computing devices use network interface cards.

(a) Describe the role of a network interface card.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/M/J/19


11

(b) Describe how a network interface card is involved in the sending and receiving of data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [7]

© UCLES 2019 9626/32/M/J/19 [Turn over


12

8 The photograph in Fig. 8.1 has been edited and is shown in Fig. 8.2.

Fig. 8.1 Fig. 8.2

Describe in detail how image editing tools could have been used to change the photograph in
Fig. 8.1 to that shown in Fig. 8.2.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [2]

© UCLES 2019 9626/32/M/J/19


13

9 Colour gradients can be used when filling shapes in digital images.

(a) Describe two properties of the filled shape that can be changed with the use of colour
gradients.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe the types of gradient that can be used when filling a shape with colour.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/M/J/19 [Turn over


14

10 Homer uses headphones to listen to the audio from movies playing on his television. Homer is
trying to decide whether to use Bluetooth or cables to connect his headphones to the TV while he
watches the movies.

Choose, with reasons, the most appropriate of these methods so that Homer can hear the
soundtrack while watching movies.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

© UCLES 2019 9626/32/M/J/19


15

11 Evaluate the use of anti-virus software and anti-spyware in combatting IT crime.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/M/J/19 [Turn over


16

12 Explain how perpetrator analysis could be used when planning for disaster recovery.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/32/M/J/19


17

13 Many countries have enacted laws to govern the use of personal data.

Analyse the need for data protection laws.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/M/J/19


18

BLANK PAGE

© UCLES 2019 9626/32/M/J/19


19

BLANK PAGE

© UCLES 2019 9626/32/M/J/19


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/32/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 9 1 9 7 5 2 7 7 5 7 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (ST/CT) 172381/2
© UCLES 2019 [Turn over
2

1 Explain, with suitable examples, why computer graphics image editing software allows users to
save bitmap images in different file formats.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/M/J/19


3

2 In JavaScript code, the sort() function is used to sort lists into ascending order.

(a) Explain, in detail, why, when using the sort() function, the list in Fig. 2.1 is sorted correctly, but
the list in Fig. 2.2 is not.

Before sorting After sorting Before sorting After sorting

fly ant 1345 1111


cockroach beetle 3666 12
ant butterfly 1111 1345
butterfly cockroach 23 23
moth fly 37 3666
beetle moth 12 37

Fig. 2.1 Fig. 2.2

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Write a line of JavaScript code that could be used to sort the list of insects in Fig. 2.1 into
descending order.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/33/M/J/19 [Turn over


4

3 An online retailer uses a simple form on its website to enable customers to contact its After Sales
department by email. The form looks like this:

Send an email to aftersales@mycompany.com:


Your Name:

Your email address:

Comment:

Send Reset

Some of the code that created the form is shown.


Note that the lines have been numbered only for your convenience and reference.

1 <html>
2 <body>
3
4 <h2>Send an email to aftersales@mycompany.com:</h2>
5
6 <form action="mailto: aftersales@mycompany.com" method="post"
enctype="text/plain">
7
8 Your Name:<br>
9
10 Your email address:<br>
11
12 Comment:<br>
13
14
15
16 </form>
17 </body>
18 </html>
19
20

© UCLES 2019 9626/33/M/J/19


5

(a) Explain what the different parts of the code in line 6 do.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(b) Create some additional lines of code that could be inserted into the script at appropriate
locations to collect the name and email address of the customer. Indicate, with reference to
the line numbers, where your additional code should be inserted.

Line number Code

[4]

© UCLES 2019 9626/33/M/J/19 [Turn over


6

(c) Write down the code that would allow:

• the comment to be entered


• the form to be submitted
• the form to be reset.

Indicate which line numbers the codes would appear on.

Line number Code

[6]

© UCLES 2019 9626/33/M/J/19


7

4 (a) Describe the drawbacks of storing company data in the ‘cloud’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Describe two benefits to a company of storing data in the ‘cloud’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/33/M/J/19 [Turn over


8

5 Describe how data is transmitted using fibre optic technology.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/M/J/19


9

6 Discuss the impact of photo editing in politics.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/M/J/19 [Turn over


10

7 The manager of a company has decided to contact existing customers to gather detailed feedback
about a product. She needs responses from a large number of customers as quickly as possible.

Use the information given in Fig. 7.1 to select, with reasons, the most appropriate method of
asking the customers for their feedback.

Administered by:
Criteria
Post Telephone Email In person

High response rate 3 3

High speed of return of results 3 3

Highly detailed questions possible 3 3

Low cost 3 3

Rapport between manager and respondents 3 3

Short time of manager involvement 3 3

Fig. 7.1

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/33/M/J/19


11

8 An online store sells goods through its website. The website has an ‘automated online assistant’ to
help the customer through the purchasing process. An ‘automated online assistant’ on a website
is a computer program that uses artificial intelligence to provide a customer with service and
assistance.

(a) Describe how the components of an ‘automated online assistant’ provide help to the customer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 9626/33/M/J/19 [Turn over


12

(b) Explain two benefits of the use of an ‘automated online assistant’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

9 Evaluate the use of physical security in combatting IT crime.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]
© UCLES 2019 9626/33/M/J/19
13

10 A typical animation has 24 frames for every second of running time (24 fps).

A bouncing ball drawn on ‘twos’ is shown on this timeline:

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
Frame number

(a) Explain why the ball is drawn on ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Suggest one reason why the animator might choose to draw the animation on ‘ones’ instead
of ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(c) Describe the effect of drawing the ball in this animation on ‘fours’ instead of ‘twos’.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

© UCLES 2019 9626/33/M/J/19 [Turn over


14

11 Discuss the impact of wearable computers in manufacturing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/M/J/19


15

12 Analyse the use of virtual reality in healthcare.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/33/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 6 0 4 6 9 6 6 3 6 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Calculators must not be used on this paper.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (SC/TP) 163071/3
© UCLES 2019 [Turn over
2

1 The coding of data refers to using M for male and F for female, for example.

Tick the four most accurate statements regarding the coding of data.

Data becomes easier to interpret

Coding of value judgements is always very accurate

The coding of data saves storage space

Codes cannot be used in a relational database

It speeds up data entry

All data can be coded

There are fewer mistakes when entering data

Codes are not too complicated so there are never any errors on data entry

Validation is easier to perform on data

Coded data makes the computer slower when searching for data
[4]

2 The management of a hotel is introducing a computer system for producing bills for their customers.
They are considering which type of printer to use.

Tick the four most accurate statements regarding different types of printer, if used in the
hotel reception area.

Laser printers produce very high quality output

A dot matrix printer would produce higher quality output than an inkjet printer

An inkjet printer would be slower at producing output than a dot matrix printer

Dot matrix printers use continuous stationery


Dot matrix printers need the ink cartridge changing more frequently than inkjet
printers
Dot matrix printers are very quiet which is important in a hotel reception area

A laser printer can operate in harsh conditions, unlike a dot matrix printer

A laser printer toner cartridge is more expensive to buy than an inkjet cartridge
Multi-part stationery is easier to use with laser printers than with dot matrix
printers
Inkjet printers are cheaper to buy than dot matrix printers
[4]
© UCLES 2019 9626/11/M/J/19
3

3 Items of data could be the following:

45612, fred, π, £, ≥ or

Explain, by describing what is meant by information, why these are just items of data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2019 9626/11/M/J/19 [Turn over


4

4 Most schools have introduced e-safety lessons because teachers are becoming concerned about
the way their students use the internet when not in school. One of their concerns is that students
may be revealing personal information about themselves.

Describe the problems associated with this and other problems that arise from students using the
internet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2019 9626/11/M/J/19


5

5 Many companies with different branches have Local Area Networks (LANs) which connect to form
a Wide Area Network (WAN).

Compare and contrast the characteristics of a LAN and a WAN owned by one company.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[6]

© UCLES 2019 9626/11/M/J/19 [Turn over


6

6 Louis has partly typed up the notes from his IT lesson. He wants to complete these at home.
Sophia, a fellow student, tells him that it may be difficult as he has been using proprietary software.

Explain what is meant by proprietary and open-source file formats, giving reasons why open-source
file formats are needed.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

7 An operating system is system software that manages computer hardware and software resources.

Describe the tasks that an operating system carries out.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2019 9626/11/M/J/19


7

8 There are a number of ways that fraudsters can obtain money from customers’ bank accounts.

(a) Describe how the fraudster would use vishing to obtain a customer’s personal data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

(b) Describe how the fraudster would use smishing to obtain a customer’s personal data.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2019 9626/11/M/J/19 [Turn over


8

9 Paolo is the owner of a small company with ten workers. He is developing a spreadsheet
to calculate the payroll. He has started by importing a text file of the workers’ names. The list
consisted of each worker’s family name followed by a comma then a space then their first name.

He wants to split the names into separate family names and first names by finding the position of
the comma in each cell in column A.

He has discovered a new function, LOCATE, which gives the position of the first occurrence of a
single character in a word.
For example, =LOCATE(“e”,I4) gives the result 2.

His first attempt at the spreadsheet is shown below.

A B C D E F G H I J K L M
Position of Rate per Hours
1 Name comma Family name First name Job Weekly pay hour worked
2
3 Smith, John Polishing 450 15 30
4 McDonnell, Louise Secretary 500 10 50
5 Hernandes, Juan Welding 450 10 45
6 Kennedy, Sean Orders 500 16 31.25
7 Gustaffsson, Johan Fitter 500 20 25
8 Davies, Iueuan Electrician 550 11 50
9 Lopez, Ramon Manager 500 25 20
10 Garcia, Isabel Painting 550 20 27.5
11 Costa, Albertina Invoices 450 15 30
12 Fernandez, Mariela Sales 550 11 50
13

(a) Using this LOCATE function, write down the formula he would use in cell C3. The formula
must be easy to replicate.

= ............................................................................................................................................[2]

You can use the space below for any working you need.

© UCLES 2019 9626/11/M/J/19


9

(b) He will use a formula in cell E3 to produce Smith. Making use of cell C3, write down the
formula, without using the MID function, which must be easy to replicate.

There must be no spaces, before, or after the name.

= ............................................................................................................................................[3]

You can use the space below for any working you need.

(c) He will use a formula in cell F3 to produce John. Making use of cell C3, write down the
formula, without using the MID function, which must be easy to replicate.

There must be no spaces before, or after, the name.

...............................................................................................................................................[3]

You can use the space below for any working you need.

(d) Describe the steps he would use to format the Weekly pay column so that the only difference
that would be made would be to place a $ sign in front of the value.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]
© UCLES 2019 9626/11/M/J/19 [Turn over
10

(e) Using only the sort feature on columns I and J, explain how you would be able to get the
following values in the given cells. You need to ensure data integrity is maintained.

(i) 500 in cell J6 with Secretary in cell I6 and Davies, Iueuan in A12.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) 500 in J7 with Orders in I8 and Smith, John in A11.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2019 9626/11/M/J/19


11

10 A car park has a barrier which operates automatically. It opens when a car approaches it and
closes when the car is clear of the barrier.

Describe, including the use of sensors, how a microprocessor controls this operation.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2019 9626/11/M/J/19 [Turn over


12

11 Maria, the A level students’ secretary, has been given the task of creating a database. It will store
the records of each subject taught and the records of the teachers involved. She has decided to
produce a relational database.
The Teacher records will have the fields Teacher_ID, Family_name, First_name, Subject_ID and
Number_of_classes. The Subject records will have the fields Subject_code, Subject_name,
Subject_level and Number_of_lessons.

(a) Complete the diagram below to show how the tables will be combined.

[4]

(b) Using the design of your database from part (a), describe how you would create it.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2019 9626/11/M/J/19


13

12 A government database stores the licence plates of cars. In this particular country they all follow
the same pattern, e.g.

BG136KG
CD125FH
FT342LM
NQ439SR

Apart from a presence check, describe two appropriate validation checks which could be applied
to licence plates. For each check give an appropriate example of invalid data that would be
rejected. Each example must be different.

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2019 9626/11/M/J/19 [Turn over


14

13 IT professionals often use command line interfaces (CLIs) to communicate with computers. Office
workers, however, prefer graphical user interfaces (GUIs). In the home, gesture based interfaces
(GBIs) are increasingly being used.

Evaluate these three types of interface.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/11/M/J/19


15

14 Many students use the internet in school to search for information to help with their classwork.

Apart from e-safety, discuss the benefits and drawbacks of students using the internet for this
purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/11/M/J/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/11/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 0 7 7 1 1 0 4 8 6 5 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 18 printed pages and 2 blank pages.

DC (SC/TP) 163072/3
© UCLES 2019 [Turn over
2

1 Tick the four statements referring to asymmetric encryption which are true.

It is often referred to as public key encryption

It uses a pair of keys, a public key and a private key


The public key and the private key are published to everyone who wants to send
a message
Anyone with a copy of the public key can read encrypted data

It is possible to deduce the private key from the public key

SSL is a protocol that uses asymmetric encryption

Keys used in symmetric encryption are longer, compared to asymmetric keys


Asymmetric encryption is slower to convert than symmetric encryption and
requires far more processing power
Digital certificates are not used with asymmetric encryption

The use of an asymmetric key algorithm always ensures security of a message


[4]

2 Tick the four statements referring to malware which are true.

A virus corrupts files but does not delete them

Ransomware continually deletes files until a ransom is paid


One purpose of releasing a worm is to occupy as much bandwidth in a network
as possible
Ransomware is often initiated by means of a trojan horse
A trojan horse is a type of malware within an email attachment that is
downloaded without the user understanding the consequences
Spyware is a type of software that removes key loggers from a hard disk

Adware is additional software attached to a virus when it is downloaded

Malicious bots are never used to instigate a SPAM attack

A rootkit enables a hacker to gain administrator rights in a victim’s computer

A trojan horse just enables a virus to be transmitted. It never deletes data itself
[4]

© UCLES 2019 9626/12/M/J/19


3

3 People in a village are aware that the local river is being polluted. They are concerned that this is
being caused by a nearby factory.

Describe how computers and sensors could be used to monitor the level of pollution in the river in
order to determine whether the factory is responsible for the pollution.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2019 9626/12/M/J/19 [Turn over


4

4 Some people get confused when trying to establish what is data, information or knowledge. The
sequence of numbers 192.168.1.254 could be an example of data.

Using this example, or another of your choice, explain how data, information and knowledge are
linked.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2019 9626/12/M/J/19


5

5 A large company with branches in many countries has decided to install a Virtual Private Network
(VPN).

(a) Describe the purpose of such a network.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[2]

(b) Explain how it achieves this purpose.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[4]

© UCLES 2019 9626/12/M/J/19 [Turn over


6

6 Video‑conferencing is a commonly used method of communication. It has affected different


sections of society.

Describe two effects of video‑conferencing for each of the following groups of people:

Legislators (government members who make legislation or laws)

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Business people

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Television news presenters

1 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

2 .......................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................
[6]

© UCLES 2019 9626/12/M/J/19


7

7 Relational databases can have many components and properties.

(a) Describe what is meant by the following terms:

(i) Primary key .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(ii) Foreign key .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

(iii) Compound key ..................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(b) Explain why referential integrity is important in a relational database.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2019 9626/12/M/J/19 [Turn over


8

8 The owners of a bank are considering changing its system of reading cheques from Magnetic Ink
Character Recognition (MICR) to Optical Character Recognition (OCR).

Give two advantages and two disadvantages of using OCR instead of MICR.

Advantage 1 ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Advantage 2 ......................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Disadvantage 1 .................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

Disadvantage 2 .................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[4]

© UCLES 2019 9626/12/M/J/19


9

9 An expert system consists of many components.

Describe how the knowledge base is used to interact with the other components when an expert
system is used to solve a problem.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[5]

© UCLES 2019 9626/12/M/J/19 [Turn over


10

10 An examinations officer has created a spreadsheet containing a list of students and their dates of
birth. It will be used to calculate each student’s age in years. This is the age that they will be on the
date of a science exam which is on 21/05/2019.

A B C D E F G H
1
Number of
Family First Date of birth exams
2 name name (dd/mm/yyyy) Age entered for 21/05/2019
3

4 Purewal Sandeep 17/05/2002 17 4 6 number of students aged 17 taking 3 exams


5 Jones Ieuan 15/10/2001 17 3 4 number of students aged 16 taking 4 exams
6 Astle Roberta 21/07/2002 16 4
7 Herreira David 10/08/2002 16 4
8 Maninga Jeff 17/09/2001 17 3
9 Charlton Leona 08/03/2002 17 4
10 van Gaal Ruud 09/02/2002 17 4
11 Alonso Maria 17/11/2001 17 3
12 Lagat Mary 10/11/2001 17 3
13 Kibaki Robert 13/04/2002 17 4
14 Mbabasi Apolo 30/06/2002 16 5
15 Dansua Albert 24/06/2002 16 4
16 Kirshwan Kiran 30/08/2002 16 3
17 Patel Alpa 15/03/2002 17 4
18 Bhutto Waseem 14/09/2001 17 3
19 Abbasi Akhtar 18/12/2001 17 4
20 Kunwar Ishwar 16/01/2002 17 3
21 al-Hafi Saad 14/03/2001 18 4
22 Hala Bassem 25/05/2002 16 5
23 Namet Fawzi 31/05/2002 16 4

(a) She entered a formula in D4 to calculate the student’s age.

Write down the formula she used. This formula should be easy to replicate.

You can assume for the purpose of this exercise that the number of days in a year averages
out to 365.25.

= ............................................................................................................................................[4]

You can use the space below for any working you need.

© UCLES 2019 9626/12/M/J/19


11

(b) (i) The spreadsheet is to be sorted in ascending order of Age and then descending order of
Number of exams entered for.

Write down the values which would be displayed in D9 and E9.

.......................................................................................................................................[2]

You can use the space below for any working you need.

(ii) The original spreadsheet is to be sorted in descending order of Age and then ascending
order of Number of exams entered for.

Write down the values which would be displayed in D17 and E17.

.......................................................................................................................................[2]

You can use the space below for any working you need.

(c) A teacher wanted to know the number of students aged 17 taking three exams.

Write down the formula containing a counting function she used in cell G4 to calculate this
number. This formula should work even if the data changes.

= ............................................................................................................................................[5]

You can use the space below for any working you need.

© UCLES 2019 9626/12/M/J/19 [Turn over


12

(d) The teacher now wants to know the number of students aged 16 taking four exams.

Write down the formula containing a counting function she used in cell G5 to calculate this
number. This formula should work even if the data changes.

...............................................................................................................................................[3]

You can use the space below for any working you need.

© UCLES 2019 9626/12/M/J/19


13

BLANK PAGE

© UCLES 2019 9626/12/M/J/19 [Turn over


14

11 A library database consists of one table containing details of all the books in a library and another
table containing details of all the borrowers. Parts of the tables are shown below.

Books table

ISBN Title Author Publisher ReplacementCost


0099445530 The Flamboya Tree Clara Olink Kelly Bow Books €7.99
0099460874 I Capture the Castle Dodie Smith Archaic €5.99
0439977797 The Tin Princess Philip Pullman Panda Books €5.99
0553812645 Ten Thousand Sorrows Elizabeth Kim Welter Books €6.99
0684817306 Kitchen Privileges Mary Higgins Clark Grimon & Custer €12.99
1857028899 The Code Book Simon Singh Quatre Domaine €8.99
9780593057063 61 Hours Lee Child Crossearth Publishers €18.99
9780593065709 The Affair Lee Child Crossearth Publishers €18.99
9780593072493 Inferno Dan Brown Crossearth Publishers €20.00
9780752860558 Sepulchre Kate Mosse Nebula Books €18.99
9781780892665 Cross Justice James Patterson Panda Books €20.00
9781846558597 Midnight Sun Jo Nesbo Panda Books €9.99

Borrowers table

ID FamilyName FirstName Mobilephone Residence


1 Gale Henry 07700 900102 Midtown
2 Brown Kurtis 01134 960675 Cheswick
3 Leadbetter Clementine 01144 960975 Chorlton
4 Hull Christine 07700 900643 Denby
5 Greenhalgh Karla 08081 570372 Portlarne
6 Pooley Fred 09098 790876 Midtown
7 Chalmers Ben 01154 960987 Denby
8 Lewis Christopher 07700 900152 Denby
9 Patel Rio 08081 570976 Chorlton
10 Gopaul Ruksana 03069 990967 Cheswick

© UCLES 2019 9626/12/M/J/19


15

(a) You have been asked to create a query which will output only the names and phone numbers
of all the borrowers who have a family name beginning with G and also live in Midtown.

Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[5]

© UCLES 2019 9626/12/M/J/19 [Turn over


16

(b) You have been asked to create a query which will output only the titles and authors of all the
books published by Panda Books which have a replacement cost of less than €20.

(i) Describe the steps you would have to follow in order to create this query, without using a
query wizard or a parameter query.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

(ii) Describe how you would set up the query in (b)(i) as a parameter query.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

.......................................................................................................................................[3]

© UCLES 2019 9626/12/M/J/19


17

(c) Explain why the above tables (on page 14) do not constitute a relational database and what
would need to be added to make them so.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...............................................................................................................................................[3]

© UCLES 2019 9626/12/M/J/19 [Turn over


18

12 Validation is often used to check that data entered into a computer is sensible. A customer orders
database contains details of the Customer ID number, the value of the order placed and the date
the order was placed. Any new order, when it is entered, needs to be validated.

Using these examples of database fields, analyse the use of the following different validation
rules – range check, type check, length check and format check.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/12/M/J/19


19

13 Many driving schools are asking IT companies to develop simulators for teaching customers to
drive.

Evaluate the development of simulators for this purpose.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

......................................................................................................................................................[8]

© UCLES 2019 9626/12/M/J/19


20

BLANK PAGE

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/12/M/J/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 Six from e.g.: 6

Some graphics software may not support all file types so different export
options allows images to be shared e.g. use of JPEG / GIF is almost
universal
Images can be saved as compressed images / files to save storage space /
allow use in various scenarios / situations e.g. use of JPEG allows
compression by various amounts but the more compression the lower the
quality
GIF allows areas to be made transparent whereas JPEG does not support
this
Different file types support different colour depths for use in various
situations e.g. JPEG supports more colours than GIF
Quality of the image is affected by choice of filetype e.g. TIFF retains better
quality than JPEG / GIF when compressed
Bitmap (BMP) files restrict the use of the images to e.g. Windows OS so
availability of other types allows cross-platform use.

Question Answer Marks

2(a) Four from: 4

Function sort () treats values as strings not numbers


Strings are sorted alphabetically
Strings are not sorted numerically
a is before / ‘lower’ than b so list 1 is sorted alphabetically by the first letter
and then by the second etc.
in list 2, the list is also sorted alphabetically so e.g. 1111 is before 12
because 2 is ‘bigger’ than 1

Max. 1 for additional examples e.g.:

The third character in 1111 has no match so is ‘bigger’ than 12


3666 is before 37 because while the 3s match, and 6 is before 7, there is no
match for the second 6 so it is ‘bigger’ than no number.

2(b) A suitable line with the function is: insects.reverse(); 2


The variable name can be anything suitable, reverse() is the function.

Mark allocation:

Use of suitable variable name e.g. insects 1 mark


All correct function and syntax .reverse(); 1 mark

© UCLES 2019 Page 3 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(a) Six from: 6

<form action="mailto: aftersales@mycompany.com"


Tells the page that this is a form to be actioned by sending / submitting the
form to a specified URL / default URL is this page
To send an email via mailto to the specified address

method="post"
Specifies the HTTP method to be used when submitting the form
In this case post means not to display the submitted data / used for sensitive
or private / personal data / make the submitted data invisible in the field / will
not allow bookmarking / is not saved in browser history
Post can send unlimited amounts of data so no need to specify the size

enctype="text/plain">
Specifies the encoding of the data
As plain text.

3(b) Four from: 4

Line
Code
number

9 <input type="text" 1 mark


name="name"> 1 mark
<br> 1 mark

11 <input type="text name"="email"> <br> 1 mark

3(c) 6
Line
Code
number

13 <input type="text" name="comment" size="100">

14 <input type="submit" value="Submit your details">

15 <input type="reset" value="Reset the form">

Six from:

Code on correct lines


Correct syntax
Size="100" or suitable value
value="Submit your details" following submit
value="Reset the form" following reset
Correct input types 1 mark each

© UCLES 2019 Page 4 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(a) Eight from: 8

Risk to data from unauthorised access through remote access via network /
internet
Data can be (more easily) lost / stolen while being replicated / distributed
across remote servers
Large number of people can access the data which leads to theft of data as
there are more people who can be compromised / make errors
Data travels over more networks’ so is more easily compromised / lost /
stolen / corrupted
Supplier of the storage may not be reliable / security aware to same degree
as owner of the data
Supplier of storage may go out of business / change their serve conditions /
be purchased by rival companies
Performance of cloud storage may not be as good as that of local storage
leading to increased access times
Owner of data may have no idea where the data is stored so may not be
aware that is being stored in another country
Owner of data is not responsible for e.g. backups so is reliant on third party
systems to maintain their data integrity
Data is extremely difficult to delete from the cloud
Legal regulations referring to the data / storage systems may be different in
different countries.

4(b) Two from e.g.: 2

Can allow access to data at any time / from anywhere with internet
connection provided one has valid User ID / password
Data can be accessed using different hardware so no need to carry
hardware with you
Company need only purchase / pay for the actual amount of storage needed
Energy use by company can be reduced by not having (large) server farms
for data storage
Number of IT staff can be reduced saving the company the cost of their
employment
Supplier of storage is responsible for e.g. backups / disaster recovery / virus
protection / security of the data.

© UCLES 2019 Page 5 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5 Six from: 6

Electrical signals converted to light for transmission / converted back to


electrical signals after transmission
LED / laser (at node) sends / transmits a light beam / electromagnetic wave
along the fibre
Data is modulated onto a carrier wave
Optical fibre connects the nodes / devices
ADC / DAC are used to modulate / demodulate the data onto / off carrier
wave
Laser is used where longer distances are to be covered
LED is used where shorter distances are to be covered as it is cheaper than
laser
Lasers produce coherent light which can allow greater bandwidth
Receiver is photo detector to convert light into electricity
Uses indium gallium arsenide in photo detector.

Question Answer Marks

6 Six from e.g.: 6

Altered images can dissuade from / reinforce a belief of the viewer


Adding people to images can persuade the viewer that the person was
present when in fact they were not
Removing people from photographs can create the belief that the person did
not participate in an event
Removing disgraced / out of favour people from photographs can create the
belief that the person did not exist
Retouching images of politicians can make them appear more attractive
than in real life so more likely to appeal to a voter
Viewers can be unaware that an image has been manipulated so may make
decisions based on false information.

Question Answer Marks

7 Four from: 4

Detail is needed so Telephone or Personal administration are options


Rapport is needed so Telephone or Personal administration are options
High response rate is needed so Telephone or Personal administration are
options
High speed of return of results is required so Telephone or Email are
options
Only Telephone meets all the requirements.

© UCLES 2019 Page 6 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

8(a) Eight from: 8

Human types a request / is flagged as requiring help / guidance by interface


/ dialog system
Dialog system provides interface between human input and the assistant’s
database
It translates human input into digital format
It generates human intelligible replies from the assistant for the human
It uses natural language processing
Avatar appears with indication that help / advice is available
Avatar represents a ‘real’ assistant to provide a more realistic experience for
the user / enhance the human-computer interaction process
Increases the trust that humans put in the system
Help / advice is generated by the system «
... for display by avatar
System provides the specific advice / help that the human requested.

8(b) Two from: 2

Help / advice is available 24/7


Decrease in number of humans required at call centre / online to provide
help / advice
Provides customised expertise for the particular website
Increase in trust of website by online shoppers.

© UCLES 2019 Page 7 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh
up your opinions.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)


Candidates will evaluate, giving advantages and disadvantages, of at least
three ways in which physical security can be used in combatting IT crime.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion / opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain giving advantages and disadvantages of at least two
ways in which physical security can be used in combatting IT crime.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion / opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will give advantages / disadvantages of using physical security
in combatting IT crime.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks):
Response with no valid content.

Answers may make reference to e.g.:

Physical barriers such as wall / doors / bars / use of floors other than ground
floor which are cheap and easy to make use of / make use of existing
resources which lowers costs
Use of CCTV which can be placed overtly to deter unauthorised persons
just by their presence or by a warning / notice that watching is occurring /
can be cost effective as a deterrent
Video surveillance can be used to watch large areas with few staff
Physical presence of guards / security staff shows persons that a security
system is in operation
... can deal with issues quickly / immediately
Security lighting / automatic lights / sensor-controlled lights can illuminate
when persons present to act as deterrent / highlight intruders / warn
intruders that they have been seen and these have low cost if e.g. solar
powered
Computer devices can be easily / cheaply / quickly fixed / attached to large
objects / shelving to deter theft
Physical locks require keys that may be lost / key fobs etc may be lost or
stolen / given to unauthorised persons
Combinations to locks can be forgotten

© UCLES 2019 Page 8 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9 Locks can be left unlocked in error


Physical keys can be copied / given to unauthorised person
Physical combinations to locks can be compromised by watching as lock is
accessed
Security staff / guards may not be alert / honest / in place when required.

Question Answer Marks

10(a) Four from: 4

Animator only needs to draw 12 frames instead of the full 24 so saves time /
effort
...fewer animators / less computer time needed for the whole project
(Drawing on ‘twos’) makes slow animations look / appear smoother to the
eye
Less precision / accuracy is needed than for drawing on ‘ones’ (‘ones’
animation does not look jerky) so drawing can be done faster / with less skill
from animator
(Drawing on ‘twos’) makes animations appear more lively / active than when
drawn on ‘ones’.

10(b) One from: 1

Action needs to appear very fast / active


Animation can include a flurry of activity around the main object
Can portray a very smooth animation of many objects in the animation.

10(c) One from: 1

The animation may appear jerky / flashing of objects on / off


Objects move very fast.

© UCLES 2019 Page 9 of 10


9626/31 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11 Command word: Discuss: give important arguments for and against. 6


Often requires a conclusion, this command word requires ‘Analysis’
and ‘Evaluation’

Six from:

Advantages:
First person / heads up display via headsets can enhance monitoring of
processes in real time from wearers point of view
Can allow enhanced monitoring of employee activity via wearable devices
on shop floor
Can track every step of activity in manufacturing by employee activity
Can allow enhanced / better manufacturing processes via wearable devices
that view / transmit live data from activity
Faults can be directly entered into fault database / expert system of
company
Can improve employee safety due to ability to remotely control machinery
while on shop floor / using wearable devices
Sensors can provide information about environment for working

Disadvantages:
Positioning of devices on body can lead to inaccuracies in the data / actions
performed
Wearable devices need power so have to carry heavy batteries
Wearable devices need charging so have downtime.
Staff may not wish to be monitored.

Max. 5 if all advantages or all disadvantages.

Question Answer Marks

12 Command word: Analyse: explain the main points or effectiveness in 6


detail, identify their characteristics, examine closely.

Six from e.g.:

Use for VR therapy for psychological / occupational therapy


Patients can interact with harmless representations of trauma-causing
stimuli to reduce fear
Can be used to treat depression instead of use of drugs
Patient can role play in a fantasy world to help manage the depression
Can be used improve the skills of autistic patients by providing controllable,
different environments
Can be used to train healthcare professionals using simulations
Simulations provides a safe and repeatable set of activities
Can perform operations remotely reducing surgeon travel time / allowing
patients access to surgeons around the world
Can allow patients to experience the operation before they actually have the
procedure so are reassured / less worried.

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1(a) Four from: 4

Download speeds are typically 2 to 5 times that of 3G


Provides bandwidths of up to 100Mps (typically 15 to 20) c.f. 3G’s 6 to
10Mps
Uses OFDM (orthogonal frequency division multiplexing) / same technology
as WiFi and digital TV which reduces latency as data is split and sent in
parallel ‘chunks’ to increase capacity
Uses MIMO (multiple input and multiple output) with multiple antenna arrays
at transmitter and receiver to increase performance
Common configuration is 2×2 MIMO for smartphones
Reduces power requirements
Reduces the need for additional bandwidth
Does not require extra data allowance to be used
Can revert seamlessly to 3G if 4G is not available
Provides smoother online streaming than 3G
Is an IP-based network.

1(b) Two from: 2

Continuous coverage in urban areas / better coverage of urban and rural


areas by providing a dense network
Lower costs of data transfer / download
Allows higher number of simultaneously connected devices / mobiles
More available spectrum
Fewer dropouts / poor signal issues / more reliable connections
Lower power requirements by phones so longer battery life / smaller
batteries
Provides greater download speeds for data than 4G
Has low latency which improves gaming / streaming experience.

Question Answer Marks

2(a) Two from e.g.: 2

Between spacecraft (in orbit through vacuum)


To connect sites across roads / other barriers not owned by sender /
receiver
Provide (temporary) network connection in e.g. disaster areas where cabling
is not possible.

2(b) One from: 1

Short range only in atmosphere due to dispersion of (light) beam by particles


in atmosphere
Accurate aiming of (light) beam is more / may be more difficult
Difficultly in connection is increased if sender / receiver are moving
Blocked by objects / weather in path of (light) beam / line of sight.

© UCLES 2019 Page 3 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3 8

Line number of error and Explanation of suggested


explanation of error correction

Line 6/9 and the function is spelt Should be same as function/


incorrectly / differently, so will not CheckAgeFunction/
run on button click CheckAgFunction

Line 8 script is not opened so web Add <script> to open the script
browser cannot interpret it

Line 9 missing {/open curly bracket Add {/open curly bracket


so line is not terminated correctly

Line 10 the variable CanApply is Add , to separate variables / add


not declared so cannot be used in new line with var / add CanApply
function to declare the variable

Line 15 age is wrongly shown as Should be 16 as per intended age


15 so age check is incorrectly check/stem/line 3
compared

Line 15 incorrect logic comparison Change to < for correct


so age messages are reversed comparison/reverse the messages
when displayed to match comparison

Line 17 “ is missing from Add “


("AgeCheck “ so AgeCheck is not
interpreted as p id so its value is
not returned

Line 19 script is not closed so web Add </script> to close the script
browser cannot interpret it

1 mark for error and 1 mark for matching correction.

© UCLES 2019 Page 4 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3 The errors are shown here:

Question Answer Marks

4 Eight from e.g.: 8

Focus group is an interview with a small number of respondents conducted


by a trained interviewer / moderator
Members often have similar backgrounds / expertise in order to pool ideas /
views
Representatives of the organiser / stake holders may be present to gather
views / suggest ideas
Informal so that respondents can interact in a natural manner and freely give
their views
Interviewer / moderator may have a guide / agenda to lead the discussion to
a conclusion as the session progresses
Can provide accurate information in a short time
Can be less expensive that other methods of gathering information
Can be more expensive if carried out over e.g. national areas to gather
information from wide range of people
Results / views can be affected by presence of observers / representatives
of interested parties
Validity of outcomes can be questionable as participants may not be
independent / be affected by presence or stake holders
Outcomes may not be kept confidential as participants are often from
external sources.

© UCLES 2019 Page 5 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a)(i) A suitable diagram could be: 5

Mark allocation:

3 marks for all milestones linked correctly


2 marks for 4 milestones linked correctly
1 mark for 3 milestones linked correctly

1 mark for all correct timings


1 mark for all correct tasks.

5(a)(ii) The critical path is F + I + J 1 mark 2


4 + 2 + 3 = (9 months) 1 mark

Question Answer Marks

6(a) A suitable diagram could be: 3

Three from:

All correct labelled boxes for routers C, D, E, F, G


All correct connecting lines between boxes / routers
All connecting lines shown as double-ended arrows.

© UCLES 2019 Page 6 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

6(b)(i) (A, B), C/D, F, G, (H). 1

6(b)(ii) Two from: 2

shortest route is 5 hops so: 5 × 6 = 30 (time units)


× 2 for return, 30 × 2 = 60 (time units).

6(c)(i) Two from: 2

longest route takes 7 hops so: 7 × 6 = 42 (time units)


× 2 for return = 84 (time units).

6(c)(ii) One mark for all correct: 1

(A, B), D, C, E, F, G (H).

6(d)(i) Between B and G. 1

6(d)(ii) Two from: 2


4 hops × 6 = 24
× 2 = 48 (time units).

© UCLES 2019 Page 7 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

7(a) Four from: 4

Provides access (for protocols) to physical / wireless transmission medium


Creates the protocol stack (using its electrical components)
Allows communications between LANs / WANs (using the protocols it has
created)
Provides low level addressing at MAC level
Works at physical and data level of OSI model / OSI layer 1 and 2.

7(b) Seven from: 7

Accepts data from CPU via internal buses


Converts parallel data stream to linear / serial data stream and vice versa for
transmission / after reception to / from transmission medium
Data is sent / received in frames

When sending:
NIC is notified that frame has been created by OS in a buffer
NIC accesses / reads buffer / memory directly by DMA
NIC determines address and creates data frame
NIC transmits completed frame to transmission medium
NIC notifies OS that frame has been sent

When receiving:
NIC monitors transmission medium for frames
NIC reads frame from transmission medium into buffer using DMA
NIC checks frame contents and calculates checksum to verify integrity of
data
NIC interrupts host OS to indicate that a frame has arrived

Max. 6 if all sending or all receiving.

Question Answer Marks

8 Two from: 2

Perspective / transformation tool has been used (to correct perspective) by


‘stretching’ the image across the top to align the sides of the stores / shops /
buildings
Rotate right tool used to correct the image to an upright store / shop /
building front
Curtains (in left windows) have been inserted by copy / paste / clone pixel
tools using those in right-hand set of windows as source
Image has been cropped to remove some of the building
Image has been resized to improve aspect ratio.

© UCLES 2019 Page 8 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9(a) Two from: 2

Opacity from completely opaque to totally transparent


Fade (actual) colour from one colour into another colour / white across the
colour palette.

9(b) Four from e.g. 4

Linear fills evenly across the image


Radial fills with single line paths where the fill starts at centre and fills
outwards along all radii
«fills evenly along all radii
Elliptical fills with two line paths where fill starts at centre and fills outwards
along two directions away from the centre
«can be skewed along one line or the other
Conical fills create the illusion that the image is a cone shape
Square fills can produce a star-like view in the colour
Three colour fills merge from one colour into two others across the image
Four colour fills merge from one colour into three others across the image.

Question Answer Marks

10 Five from: 5

Cable ensures an uninterrupted connection to the TV


Cable does not suffer from dynamic range limitations as does Bluetooth
transmission so (action) movies do not have same impact
Cable does not suffer from limited frequency ranges as does Bluetooth
transmission so movie experience can be spoiled
Cable does not need power in the headphones so can be used without
preparation when watching movies / unlimited by battery going flat
Bluetooth can suffer from interference from other wireless devices which can
spoil the sound (effects) from movie
Bluetooth takes time to process so video and audio are out of sync / lip sync
issues spoil the movie experience
Bluetooth headphones can be larger / uncomfortable / heavy due to battery
requirements to movie watchers who get tired of using them before end of
movie
Bluetooth headphones do not work if battery is flat / needs charging, so
cannot listen to sound of movie.

© UCLES 2019 Page 9 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11 This question to be marked as a Level of Response. 8

Level 3 (7–8 marks)


Candidates will evaluate, giving both advantages and disadvantages, of the
use of anti-virus software in combatting IT crime.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion / opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain both advantages and disadvantages, of the use of
anti-virus software in combatting IT crime.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion / opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will describe the use of anti-virus software in combatting IT
crime
Candidates will explain advantages / disadvantages of the use of anti-virus
software in combatting IT crime
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

Advantages
Removes virus / malicious software that could delete / edit / destroy data
Protect against spyware to prevent theft of confidential / personal
information thus preventing unauthorised access to bank accounts leading
to financial loss
Can help / may protect against spam / phishing emails thus preventing the
divulgence of confidential / personal information
Protect against identity theft that may be a result of stolen confidential /
personal information
Protect against redirection of automatic payments (‘stealware’ or
‘chargeware / affiliate fraud’) to help prevent ’click fraud’
Can help protect / stop unwanted / unauthorised use of computer for crypto-
currency mining

© UCLES 2019 Page 10 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11 Disadvantages
Anti-virus software must be kept up to date in order to combat the most
recent viruses / malicious software
Anti-virus software must be running all the time so places a performance
‘overhead’ on a computer system that may make the system slow / sluggish
/ unresponsive
Anti-virus software will not detect all / every instance / type of malicious
software so perpetrators can find ways around it
...infected websites use malicious code which is often not picked up by anti-
virus software.

Question Answer Marks

12 Six from: 6

Perpetrators are the attackers and include e.g. script kiddies, crackers,
hackers, terrorists, business competitors, (foreign) governments who carry
out the crimes / intrusions
Each type of perpetrator has different skills / aims that can be identified by
an analysis
.. the higher the skill, the higher the risk of crime being perpetrated
Analysis of their actions is carried out by the company / victim agents /
representatives who design / implement the plan for disaster recovery
Allocation of resources to disaster recovery from cyber threats depends on
likelihood of perpetrators succeeding / wishing to / probability of attack on
the company
Analysis will define / determine the type of resource allocated e.g. firewalls /
antivirus / antispyware software
Intrusion detection systems can be deployed to combat the type of
perpetrator identified by the analysis
Resources can be targeted at the type of intruder / risk identified by the
analysis of who / what is likely to be of concern.

© UCLES 2019 Page 11 of 12


9626/32 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

13 Eight from e.g.: 8

Data protection laws are needed to address these concerns e.g.:

Personal data is stored on computer systems / in databases which may not


be secure
Databases are easily edited / searched / accessed (remotely) so data can
be seen / manipulated
Data can be easily / quickly cross-referenced / correlated by computer
systems
Computer systems can be networked so data can be accessed from many
different locations / shared more easily between users
Control over shared data is more difficult to maintain
Accuracy of the information may be compromised / difficult to maintain when
shared
Data can be easily copied to other media / stolen without any trace of the
action
Data about individuals can be stored without their knowledge so infringing
their privacy
Keeping records of who / what / when data is accessed are difficult to
maintain unless enforced by law.

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 Six from e.g.: 6

Some graphics software may not support all file types so different export
options allows images to be shared e.g. use of JPEG / GIF is almost
universal
Images can be saved as compressed images / files to save storage space /
allow use in various scenarios / situations e.g. use of JPEG allows
compression by various amounts but the more compression the lower the
quality
GIF allows areas to be made transparent whereas JPEG does not support
this
Different file types support different colour depths for use in various
situations e.g. JPEG supports more colours than GIF
Quality of the image is affected by choice of filetype e.g. TIFF retains better
quality than JPEG / GIF when compressed
Bitmap (BMP) files restrict the use of the images to e.g. Windows OS so
availability of other types allows cross-platform use.

Question Answer Marks

2(a) Four from: 4

Function sort () treats values as strings not numbers


Strings are sorted alphabetically
Strings are not sorted numerically
a is before / ‘lower’ than b so list 1 is sorted alphabetically by the first letter
and then by the second etc.
in list 2, the list is also sorted alphabetically so e.g. 1111 is before 12
because 2 is ‘bigger’ than 1

Max. 1 for additional examples e.g.:

The third character in 1111 has no match so is ‘bigger’ than 12


3666 is before 37 because while the 3s match, and 6 is before 7, there is no
match for the second 6 so it is ‘bigger’ than no number.

2(b) A suitable line with the function is: insects.reverse(); 2


The variable name can be anything suitable, reverse() is the function.

Mark allocation:

Use of suitable variable name e.g. insects 1 mark


All correct function and syntax .reverse(); 1 mark

© UCLES 2019 Page 3 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3(a) Six from: 6

<form action="mailto: aftersales@mycompany.com"


Tells the page that this is a form to be actioned by sending / submitting the
form to a specified URL / default URL is this page
To send an email via mailto to the specified address

method="post"
Specifies the HTTP method to be used when submitting the form
In this case post means not to display the submitted data / used for sensitive
or private / personal data / make the submitted data invisible in the field / will
not allow bookmarking / is not saved in browser history
Post can send unlimited amounts of data so no need to specify the size

enctype="text/plain">
Specifies the encoding of the data
As plain text.

3(b) Four from: 4

Line
Code
number

9 <input type="text" 1 mark


name="name"> 1 mark
<br> 1 mark

11 <input type="text name"="email"> <br> 1 mark

3(c) 6
Line
Code
number

13 <input type="text" name="comment" size="100">

14 <input type="submit" value="Submit your details">

15 <input type="reset" value="Reset the form">

Six from:

Code on correct lines


Correct syntax
Size="100" or suitable value
value="Submit your details" following submit
value="Reset the form" following reset
Correct input types 1 mark each

© UCLES 2019 Page 4 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

4(a) Eight from: 8

Risk to data from unauthorised access through remote access via network /
internet
Data can be (more easily) lost / stolen while being replicated / distributed
across remote servers
Large number of people can access the data which leads to theft of data as
there are more people who can be compromised / make errors
Data travels over more networks’ so is more easily compromised / lost /
stolen / corrupted
Supplier of the storage may not be reliable / security aware to same degree
as owner of the data
Supplier of storage may go out of business / change their serve conditions /
be purchased by rival companies
Performance of cloud storage may not be as good as that of local storage
leading to increased access times
Owner of data may have no idea where the data is stored so may not be
aware that is being stored in another country
Owner of data is not responsible for e.g. backups so is reliant on third party
systems to maintain their data integrity
Data is extremely difficult to delete from the cloud
Legal regulations referring to the data / storage systems may be different in
different countries.

4(b) Two from e.g.: 2

Can allow access to data at any time / from anywhere with internet
connection provided one has valid User ID / password
Data can be accessed using different hardware so no need to carry
hardware with you
Company need only purchase / pay for the actual amount of storage needed
Energy use by company can be reduced by not having (large) server farms
for data storage
Number of IT staff can be reduced saving the company the cost of their
employment
Supplier of storage is responsible for e.g. backups / disaster recovery / virus
protection / security of the data.

© UCLES 2019 Page 5 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5 Six from: 6

Electrical signals converted to light for transmission / converted back to


electrical signals after transmission
LED / laser (at node) sends / transmits a light beam / electromagnetic wave
along the fibre
Data is modulated onto a carrier wave
Optical fibre connects the nodes / devices
ADC / DAC are used to modulate / demodulate the data onto / off carrier
wave
Laser is used where longer distances are to be covered
LED is used where shorter distances are to be covered as it is cheaper than
laser
Lasers produce coherent light which can allow greater bandwidth
Receiver is photo detector to convert light into electricity
Uses indium gallium arsenide in photo detector.

Question Answer Marks

6 Six from e.g.: 6

Altered images can dissuade from / reinforce a belief of the viewer


Adding people to images can persuade the viewer that the person was
present when in fact they were not
Removing people from photographs can create the belief that the person did
not participate in an event
Removing disgraced / out of favour people from photographs can create the
belief that the person did not exist
Retouching images of politicians can make them appear more attractive
than in real life so more likely to appeal to a voter
Viewers can be unaware that an image has been manipulated so may make
decisions based on false information.

Question Answer Marks

7 Four from: 4

Detail is needed so Telephone or Personal administration are options


Rapport is needed so Telephone or Personal administration are options
High response rate is needed so Telephone or Personal administration are
options
High speed of return of results is required so Telephone or Email are
options
Only Telephone meets all the requirements.

© UCLES 2019 Page 6 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

8(a) Eight from: 8

Human types a request / is flagged as requiring help / guidance by interface


/ dialog system
Dialog system provides interface between human input and the assistant’s
database
It translates human input into digital format
It generates human intelligible replies from the assistant for the human
It uses natural language processing
Avatar appears with indication that help / advice is available
Avatar represents a ‘real’ assistant to provide a more realistic experience for
the user / enhance the human-computer interaction process
Increases the trust that humans put in the system
Help / advice is generated by the system «
... for display by avatar
System provides the specific advice / help that the human requested.

8(b) Two from: 2

Help / advice is available 24/7


Decrease in number of humans required at call centre / online to provide
help / advice
Provides customised expertise for the particular website
Increase in trust of website by online shoppers.

© UCLES 2019 Page 7 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh
up your opinions.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)


Candidates will evaluate, giving advantages and disadvantages, of at least
three ways in which physical security can be used in combatting IT crime.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion / opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will explain giving advantages and disadvantages of at least two
ways in which physical security can be used in combatting IT crime.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion / opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)


Candidates will give advantages / disadvantages of using physical security
in combatting IT crime.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks):
Response with no valid content.

Answers may make reference to e.g.:

Physical barriers such as wall / doors / bars / use of floors other than ground
floor which are cheap and easy to make use of / make use of existing
resources which lowers costs
Use of CCTV which can be placed overtly to deter unauthorised persons
just by their presence or by a warning / notice that watching is occurring /
can be cost effective as a deterrent
Video surveillance can be used to watch large areas with few staff
Physical presence of guards / security staff shows persons that a security
system is in operation
... can deal with issues quickly / immediately
Security lighting / automatic lights / sensor-controlled lights can illuminate
when persons present to act as deterrent / highlight intruders / warn
intruders that they have been seen and these have low cost if e.g. solar
powered
Computer devices can be easily / cheaply / quickly fixed / attached to large
objects / shelving to deter theft
Physical locks require keys that may be lost / key fobs etc may be lost or
stolen / given to unauthorised persons
Combinations to locks can be forgotten

© UCLES 2019 Page 8 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9 Locks can be left unlocked in error


Physical keys can be copied / given to unauthorised person
Physical combinations to locks can be compromised by watching as lock is
accessed
Security staff / guards may not be alert / honest / in place when required.

Question Answer Marks

10(a) Four from: 4

Animator only needs to draw 12 frames instead of the full 24 so saves time /
effort
...fewer animators / less computer time needed for the whole project
(Drawing on ‘twos’) makes slow animations look / appear smoother to the
eye
Less precision / accuracy is needed than for drawing on ‘ones’ (‘ones’
animation does not look jerky) so drawing can be done faster / with less skill
from animator
(Drawing on ‘twos’) makes animations appear more lively / active than when
drawn on ‘ones’.

10(b) One from: 1

Action needs to appear very fast / active


Animation can include a flurry of activity around the main object
Can portray a very smooth animation of many objects in the animation.

10(c) One from: 1

The animation may appear jerky / flashing of objects on / off


Objects move very fast.

© UCLES 2019 Page 9 of 10


9626/33 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11 Command word: Discuss: give important arguments for and against. 6


Often requires a conclusion, this command word requires ‘Analysis’
and ‘Evaluation’

Six from:

Advantages:
First person / heads up display via headsets can enhance monitoring of
processes in real time from wearers point of view
Can allow enhanced monitoring of employee activity via wearable devices
on shop floor
Can track every step of activity in manufacturing by employee activity
Can allow enhanced / better manufacturing processes via wearable devices
that view / transmit live data from activity
Faults can be directly entered into fault database / expert system of
company
Can improve employee safety due to ability to remotely control machinery
while on shop floor / using wearable devices
Sensors can provide information about environment for working

Disadvantages:
Positioning of devices on body can lead to inaccuracies in the data / actions
performed
Wearable devices need power so have to carry heavy batteries
Wearable devices need charging so have downtime.
Staff may not wish to be monitored.

Max. 5 if all advantages or all disadvantages.

Question Answer Marks

12 Command word: Analyse: explain the main points or effectiveness in 6


detail, identify their characteristics, examine closely.

Six from e.g.:

Use for VR therapy for psychological / occupational therapy


Patients can interact with harmless representations of trauma-causing
stimuli to reduce fear
Can be used to treat depression instead of use of drugs
Patient can role play in a fantasy world to help manage the depression
Can be used improve the skills of autistic patients by providing controllable,
different environments
Can be used to train healthcare professionals using simulations
Simulations provides a safe and repeatable set of activities
Can perform operations remotely reducing surgeon travel time / allowing
patients access to surgeons around the world
Can allow patients to experience the operation before they actually have the
procedure so are reassured / less worried.

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 4
Data becomes easier to interpret

Coding of value judgements is always very accurate

The coding of data saves storage space 3

Codes cannot be used in a relational database

It speeds up data entry 3

All data can be coded

There are fewer mistakes when entering data 3

Codes are not too complicated so there are never any errors on
data entry

Validation is easier to perform on data 3

Coded data makes the computer slower when searching for data

Question Answer Marks

2 4
Laser printers produce very high quality output 3

A dot matrix printer would produce higher quality output than an


inkjet printer

An inkjet printer would be slower at producing output than a dot


matrix printer

Dot matrix printers use continuous stationery 3

Dot matrix printers need the ink cartridge changed more frequently
than inkjet printers

Dot matrix printers are very quiet which is important in a hotel


reception area

A laser printer can operate in harsh conditions unlike a dot matrix


printer

A laser printer toner cartridge is more expensive to buy than an 3


inkjet cartridge

Multi-part stationery is easier to use with laser printers than with dot
matrix printers

Inkjet printers are cheaper to buy than dot matrix printers 3

© UCLES 2019 Page 3 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3 Six from: 6

Data on its own has no meaning


Only when it is interpreted does data take on meaning and become
information
Data consists of raw facts and figures
Data has to be processed (into sets) to become information
Data needs to have a context in order to become information
Data can be in the form of numbers, characters, symbols, images as shown
in the example (must have three)
Information is what you get after a piece of data is processed and organised
and is easily interpretable unlike the examples given
Marks are available for explained examples of how data becomes
information

Question Answer Marks

4 Six from: 6

Unauthorised access to personal information


The risk of being subject to grooming by those with whom they make
contact on the internet
The sharing / distribution of personal images without an individual’s consent
or knowledge
Inappropriate communication / contact with others, including strangers
Cyber-bullying by fellow students

Other problems
Access to unsuitable video / internet games
An inability to evaluate the quality, accuracy and relevance of information on
the internet
Plagiarism and copyright infringement
Illegal downloading of music or video files
giving rise to the potential for excessive use which may affect the social
and emotional development and learning of the student
Access to illegal, harmful or inappropriate images or other content

Must have at least two of each to gain full marks

© UCLES 2019 Page 4 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5 Six from: 6

Both are used to connect computers together


providing all the advantages of a computer network
Both can be connected using copper cable or fibre optic cable
Both are used to share files

Data transfer rates are faster within a LAN


Data transmission errors are fewer within a LAN
WANs cover a larger geographical area than a LAN
LAN can be more secure as can be confined to one building and not
connected to outside users/hackers
As WANs tend to consist of more complex systems so they are less fault
tolerant
LAN shares the information needed by each branch whereas WAN shares
the information needed by all branches

Must have at least one difference and one similarity to gain full marks

Question Answer Marks

6 Five from: 5

Open source formats are often called free file formats if they are not covered
by any copyrights/patents
Open file formats can be used by both proprietary and open source software
A proprietary file format has been created by a software company using a
particular encoding scheme...
...designed by the company such that the decoding of this stored data is
only easily done with software that the company itself has developed
The specification of the data encoding format is usually kept secret
It can be published but then its use is restricted through licences such that
only the company itself/ users with licences may use it

Open-source file formats are needed:


Because not everyone can afford proprietary software
When transferring data from one area to another as the computers being
used may not have compatible software
Archived proprietary files may be difficult to read by new software

© UCLES 2019 Page 5 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

7 Four from: 4

Allocates memory to software


Sends data/instructions to printers
Responds to input devices
Opens and closes files on storage devices
In multi-tasking/multi-programming systems allocates equitable processing
time to each task/program
Sends error messages to applications/users
Handles user logins
Handles file permissions/security settings
Provides the interface between the user and the computer

Question Answer Marks

8(a) Three from: 3

Fraudster phones the victim pretending it is a call from the bank


Fraudster claims that there has been some fraudulent activity on the
customer’s account/customer has made certain purchases – could they
confirm?
Often involves getting the customer to phone the bank
Fraudster’s computer redirects phone call to own phone
Gives customer their bank details to get their confidence
Gets customer to log on to bank’s site and enter their details to transfer
money to their new account which has been set up
This account is actually the fraudster’s own bank account

8(b) Three from: 3

Fraudster sends a cell phone text message to persuade customer to divulge


their personal Information
inviting the receiver to go to the fraudster’s website
They include a telephone number in the message that connects to an
automated voice response system
They include in the message something that demands the target's
immediate attention such as
"We confirm that you have signed up to our service. You will be charged
$2 a day unless you cancel your order on this URL”
The user then goes on to a seemingly legitimate website that asks them to
"confirm/enter your personal financial information”

© UCLES 2019 Page 6 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

9(a) =LOCATE(“,”,A3)

=LOCATE(,A3) 1 mark 1

“,” 1 mark 1

9(b) =LEFT(A3,C3-1)

=LEFT() 1

A3, as first item 1

C3-1 as second item 1

9(c) =RIGHT(A3,LEN(A3)-C3-1)

=RIGHT(A3, ) 1

LEN(A3) 1

-C3-1) 1

9(d) Three from: 3


Highlight J3:J12
Click on format then format cells
Click on currency then select $ symbol
Select 0 decimal places

9(e)(i) Select A3:M12 1

Sort in ascending order of column J 1

Add a level and sort in descending order of column I 1

9(e)(ii) Select A3:M12 1

Sort in descending order of column J 1

Add a level and sort in ascending order of column I 1

© UCLES 2019 Page 7 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

10 Four from: 4

Induction loop / pressure sensor


sends signal/data to microprocessor
Analogue to digital converter changes the analogue input to digital for the
microprocessor to process
Microprocessor compares reading with pre-set value
If pressure is greater than/if inductance is different to preset value
Microprocessor sends a signal to an actuator
which raises the barrier
Light sensor detects the break in the beam of light
When the beam of light resumes the microprocessor sends a signal to an
actuator
which lowers the barrier

Question Answer Marks

11(a)
Teacher record table Subject record table

ᴕ Teacher_ID 1 ᴕ Subject_code

Family_name Subject_name

First_name Subject_level

Subject_ID Number_of_lessons

Number_of_classes

All Teacher records and Subject records with correctly titled tables 1

Primary key fields identified 1

Relationship line between correct two fields 1

One to many indicated 1

11(b) Four from: 4

Teacher_ID is identified/selected as the primary key in Teacher Table and


Subject_code is identified/selected as primary key in Subjects Table
Click on relationships in (database) tools
Click on add tables and select Teacher Table and Subjects Table
Select Subject_code in Subject records table and connect it to Subject_ID in
the Teacher records table
Enforce referential integrity/Click on save changes

© UCLES 2019 Page 8 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

12 Length check to no more or no less than/exactly 7 characters are entered 1

Any suitable example of less than/greater than 7 characters 1

Format check to ensure that all licence plates are two letters followed by 1
three digits followed by two letters

Any suitable example not consisting of two letters followed by three digits 1
followed by two letters

Question Answer Marks

13 Eight from: 8

Users with physical handicaps may not be able to use a keyboard or mouse
For reasons of hygiene a doctor may not be allowed to touch a display or
device so need to use gesture based interface
Appropriate gestures is a more hygienic way to control the device
Gestures may be a quicker way of initiating a response from a device
Certain gestures may not be socially acceptable which is not a problem with
the other interfaces
Some gestures may be unintentional but still initiate a reaction from the
device
GUIs tend to be more accurate than relying on gestures
CLI requires user to have to learn many commands unlike the others
CLI commands are more difficult to edit
CLI is more difficult to view different items on one screen when multitasking
CLI processing speed tends to be faster than the others
CLI uses less memory than the others
CLI is less likely to change over time whereas GUIs tend to change regularly
meaning less need to learn how to use a new system

One mark is available for an appropriate opinion

© UCLES 2019 Page 9 of 10


9626/11 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

14 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will discuss the benefits and drawbacks of using the internet
The information will be relevant, clear, organised and presented in a
structured and coherent format
There may be a reasoned conclusion/opinion
Specialist terms will be used correctly and appropriately

Level 2 (4–6 marks)


Candidates will discuss the benefits and drawbacks of using the internet
although development of some of the points will be limited to one side of the
argument
For the most part, the information will be relevant and presented in a
structured and coherent format
Specialist terms will be used appropriately and for the most part correctly

Level 1 (1–3 marks)


Candidates will present benefits or drawbacks of using the internet
There will be little or no use of specialist terms
Answers may be simplistic with little or no relevance

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.

Benefits
Internet tends to be up to date
Internet has vast amounts of information/ wide range of information/ wide
variety of sources
Use of search engines makes it quicker to find information than looking in
books
Multimedia sources are available on the internet unlike text books
Interactive sites can be found on the internet unlike text books

Drawbacks
Danger of accessing inappropriate websites.
Can take long time to find required information
Can access biased/inaccurate websites
Lack of expertise leads to inefficient searching
Easy to plagiarise information
The internet is not regulated
Internet provides a variety of answers so it is difficult to decide which answer
is correct

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 4
It is often referred to as public key encryption 9

It uses a pair of keys, a public key and a private key 9

The public key and the private key are published to everyone who
wants to send a message

Anyone with a copy of the public key can read encrypted data

It is possible to deduce the private key from the public key

SSL is a protocol that uses asymmetric encryption 9

Keys used in symmetric encryption are longer, compared to


asymmetric keys

Asymmetric encryption is slower to convert than symmetric


9
encryption and requires far more processing power

Digital certificates are not used with asymmetric encryption

The use of asymmetric key algorithms always ensures security of a


message

Question Answer Marks

2 4
A virus corrupts files but does not delete them

Ransomware continually deletes files until a ransom is paid

One purpose of releasing a worm is to occupy as much bandwidth


9
in a network as possible

Ransomware is often initiated by means of a trojan horse 9

A trojan horse is a type of malware within an e-mail attachment that


9
is downloaded without the user understanding the consequences

Spyware is a type of software that removes key loggers from a hard


disk

Adware is additional software attached to a virus when it is


downloaded

Malicious bots are never used to instigate a SPAM attack

A rootkit enables a hacker to gain administrator rights in a victim’s


9
computer

A trojan horse just enables a virus to be transmitted as it never


deletes data itself

© UCLES 2019 Page 3 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3 Five from: 5

Place sensors upstream and downstream from the factory


Temperature / light / turbidity sensors would be connected to computer
(Analogue) data is converted into digital using an analogue to digital
converter / ADC
Conversion / use of ADC enables the computer to understand the data
Computer receives data from sensors / ADC
Readings from above the factory are compared with those from below the
factory by the computer
Differences / results are printed out / displayed on screen
Graphs are automatically produced by the computer showing values from
below and above the factory
Computer stores readings in a table ready for processing.

Question Answer Marks

4 Four from: 4

Max three from:


Data consists of raw facts and figures as it does not have any meaning until
it is processed and given a context
Information is data that is assigned a meaning / presented within a context
that gives it meaning, relevance and purpose
Knowledge is know-how and learning of contextualised information

Max three from:


The example does not have a meaning / context
The context could be they form an IP address which makes this information
Only when it is apparent that IPv4 addresses always consist of four
numbers separated by full stops and each number must be between 0 and
255 does this become knowledge
Or equivalent statements for their own example (1 for example explained as
data, 1 for context explained, 1 for explanation of how it can become
knowledge).

© UCLES 2019 Page 4 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a) Two from: 2

To enable organisations to communicate over a large area securely


To enable employees to transmit data securely
To enable employees to access the company’s computer network remotely /
from home securely
To restrict which external users are able to use the company’s network
To restrict the resources the external user is permitted to use.

5(b) Four from: 4

This process is called tunnelling as it uses a secure means to tunnel through


a publicly accessible network
It uses encryption «
« involves the use of private and / or public keys «
« scrambles data so that only the key holder can decrypt / understand it
« data remains encrypted throughout transmission and is only decrypted at
the destination computer
It can use IPsec «
« is a network protocol suite that encrypts packets of data sent over a
network «
« protects data flows between a pair of hosts (host-to-host) / between a
pair of security gateways (network-to-network) / between a security gateway
and a host (network-to-host)
It uses a firewall «
« which (monitors and) controls the incoming and outgoing network
traffic «
« establishes a barrier between a trusted, secure internal network and
another outside network or computer
It uses authentication, authorisation, and accounting / AAA «
« AAA server is a program that handles user requests for access to
computer resources «
« AAA server typically interacts with network access and gateway servers /
with databases and directories containing user information
It can use TLS / SSL «
« uses asymmetric encryption to establish the session «
« symmetric encryption for the main conversation.

© UCLES 2019 Page 5 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

6 Six from: 6

Legislators

Two from:
Local government representatives would no longer have to attend a meeting
far from their home leading to savings in travel expenses
Representatives can take part in and observe a meeting happening in more
than one location
Problems with video transmissions could lead to misunderstandings / delays
in passing laws
Saves the task of booking a room for a meeting

Business people

Two from:
Do not have to pay for air / train tickets / car running costs to meet with
customers
Do not have to pay for hotel accommodation to meet with customers
Saves the cost of hiring a venue for a meeting
When vital workers in a business have to travel, the business is left
short- handed, possibly for days
Flight cancellations, airport delays, traffic jams will no longer be reasons or
excuses for missing meetings and conferences
Can increase productivity as a worker who has a sick child, for example,
may be able to hold an important meeting even if they have to stay home for
the day
Workers can easily share a word-processed document / spreadsheet with a
manager
Much less personal interaction

Television news presenters

Two from:
• Can hold discussions with more than one person who normally would
not travel just for an interview
• Can speak with correspondents based in different countries
simultaneously
• Do not have to wait for eye-witnesses to travel to the tv centre
• Presenters do not have to travel to dangerous areas
• Interviewees do not have to travel and risk arrest / terrorists / attack.

© UCLES 2019 Page 6 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

7(a) A primary key is a field in a table which is unique and enables you to identify 1
every record in that table.

A foreign key is used to link tables together and create a relationship / it is a 1


field in one table that is linked to the primary key in another table.

A compound key is a primary key that combines more than one foreign key 1
to make a unique value.

7(b) Three from: 3

Prevents the entry of duplicate data


Prevents records being added to a related table if there is no associated
record in the primary table
Prevents the changing of values in a primary table that result in orphaned
records in a related table
Prevents the deletion of records from a primary table if there are matching
related records.

Question Answer Marks

8 Advantages – Two from: 4

The bank will have an electronic copy of the cheque to refer in case of
customer complaints
Can read all the data on the cheque / not limited to MICR characters
Cheques can be processed after being deposited at ATMs
Cheques can be processed having been sent by phone (camera)

Disadvantages – Two from:

Cheques will be easier to forge / less secure


New OCR equipment / software will need to be purchased
If cheques are written over OCR will not be able to read it
OCR is less accurate than MICR.

Question Answer Marks

9 Five from: 5

Knowledge base consists of a database of facts / factual data and a rules


base
Inference engine uses the rules base to reason through the symptoms
Inference engine uses the data or facts in the knowledge base to reason
through the symptoms
Inference engine compares symptoms to those in the knowledge base
Inference engine uses the rules base of IF«THEN« rules / comparisons
Knowledge base editor enables the knowledge engineer to edit rules and
facts within the knowledge base.

© UCLES 2019 Page 7 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

10(a) =INT((G$2-C4)/365.25)

INT() 1

(G$2 1

-C4) 1

/365.25 1

10(b)(i) 16 1

4 1

10(b)(ii) 16 1

3 1

10(c) =COUNTIFS(D4:D23,17,E4:E23,3)

=COUNTIFS() 1

(D4:D23 1

,17, immediately after D4:D23 1

E4:E23 (and must come) after D4:D23 within same function 1

,3) immediately after E4:E23 within the same function as D4:D23 1

10(d) =COUNTIFS(D4:D23,16,E4:E23,4)

=COUNTIFS(D4:D23«.) 1

,16,E4:E23 1

,4) immediately after E4:E23 1

© UCLES 2019 Page 8 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

11(a) Five from: 5

Select query design


In the table row select Borrowers/add Borrowers table
In the field row, select the fields FamilyName, FirstName, Mobilephone and
Residence
In Show row untick Residence
In criteria row under FamilyName enter Like G*
In criteria row under Residence enter Midtown

11(b)(i) Three from: 3

Select query design, in the table row select Books/add Books table and in
the field row, select the fields Title, Author, Publisher and ReplacementCost
In Show row untick Publisher and ReplacementCost
In criteria row under Publisher enter Panda Books
In criteria row under ReplacementCost enter <20

11(b)(ii) Three from: 3

Select query design


Use of [ ] in either prompt
In criteria row under Publisher enter [appropriate prompt]
In criteria row under ReplacementCost enter [appropriate prompt].

11(c) Three from: 3

There is no field in the Borrowers table which contains similar data to any
field in the Books table
A field needs to be added to the Borrowers table containing the ISBN
number of the book borrowed
A link / relationship would need to be created between ISBN number in the
Books table and this new field in the Borrower table
ISBN in the borrowers table will be the foreign key
Or a field needs to be added to the Books table containing the ID of the
borrower
A link / relationship would need to be created between ID in the Borrowers
table and this new field in the Books table
ID in the books table will be the foreign key.

© UCLES 2019 Page 9 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

12 Eight from: 8

Max Five from:

A range check is used to check that data is within the boundaries of a given
range and could be used on the value of the order placed / the date the
order was placed
Data must be greater than a lower limit and less than an upper limit / day
must be greater than 0 and less than 32 / month must be greater than 0 and
less than 13 / year must be greater than« and less than« (accept any
reasonable example)
A type check is used to check that data is of the correct data type and could
be used on the value of the order placed / individual components of the date
the order was placed
Value of order placed must be numeric / components of date must be
numeric
A format check is to check that the data is in the correct format and could be
used on Customer id number / date order placed
Customer ID might be in the form of one letter followed by 6 digits / date
order placed might be 2 numbers followed by a dash followed by 2 numbers
followed by a dash followed by 4 numbers (accept any reasonable example)
A length check is to check that data is of the correct length and could be
used on the Customer ID number / date order placed
Any reasonable example of a length check

Max Five from:

A range check would not be appropriate for the Customer ID number as it is


likely to consist of alphanumeric characters
A range check would trap any values outside the range but might not pick
up transposition errors
A type check would not be appropriate on Customer ID number as the
values might not solely consist of digits
A type check would trap letters typed instead of numbers but might not pick
up values outside a range or transposition errors
A format check would not be appropriate on value of order placed as the
values in the numeric part might vary in length considerably
A format check would trap incorrect formats but might not pick up
transposition errors
A length check would not be appropriate on value of order placed as the
values might vary in length considerably
A length check would check the correct length of the data item but would not
pick up data of the wrong format or transposition errors.

© UCLES 2019 Page 10 of 11


9626/12 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

13 This question to be marked as levels of response: 8

Level 3 (7–8 marks)


Candidates will include the advantages and disadvantages of simulations.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion / opinion.
Specialist terms will be used correctly and appropriately.

Level 2 (4–6 marks)


Candidates will include the advantages and disadvantages of simulations.
Although development of some of the points will be limited to one side of the
argument.
For the most part, the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates will present advantages or disadvantages of simulations.
There will be little or no use of specialist terms.
Answers may be simplistic with little or no relevance.

Level 0 (0 marks)
Response with no valid content.

Examples may include:

Advantages:
Driving schools can test all aspects of driving without worrying about
damaging an expensive car
Can provide results that are generally difficult to measure such as reaction
times
Computer simulation can allow you to see how a system might respond
before you design or modify it avoiding mistakes
It is safer to use a model and simulation for car driving
Can be slowed down to study behaviour more closely
Is easier to create a simulation of a critical event rather than waiting for it to
happen in real life
Is easier to create a simulation of different driving conditions rather than
waiting for it to happen in real life

Disadvantages:
Sometimes there is not sufficient data to produce a mathematical model
Sometimes it is impossible to create simulations that can accurately predict
the occurrence / effects of human behaviour
The formula and functions that are used may not provide an accurate
description of the system resulting in inaccurate output from the simulation
Sometimes simulations can require the use of a computer system with a fast
processor and large amounts of memory which are very expensive
May give drivers a false sense of security regarding their ability to drive.

© UCLES 2019 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory May/June 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the May/June 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level and Cambridge Pre-U components, and
some Cambridge O Level components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

1 4
Hard disks are metal platters with a magnetic coating that stores data 9

Magnetic tape drives have moving parts and so are at risk of being
damaged

Magnetic tape drives can have almost instantaneous data access

SSDs have a faster data transfer rate than magnetic tape drives 9

Magnetic tape uses direct access to search for data

Magnetic tapes are used in laptop computers more than hard disks

SSDs store considerably more data than magnetic tapes

SSDs still cost more per gigabyte than hard disk drives 9

SSDs make more noise than the sound of hard disk drives when in
use

Magnetic tapes are used to store backups of data on file servers 9

Question Answer Marks

2 4
A temperature sensor is able to directly control the temperature of
water in a washing machine

A pressure sensor is often used to monitor the amount of pollution in a


river

A moisture sensor is used to monitor the pollution in a river

A humidity sensor is often used in a computerised weather station 9

Microprocessors are unable to directly read the analogue data 9


produced by a sensor

In order to control physical variables, microprocessors send signals to 9


actuators to take action

Passive sensors produce both input and output

A weather station is an example of a control system

An air conditioning system is an example of a control system where 9


the output affects the input

Monitoring systems never need sensors to input data

© UCLES 2019 Page 3 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

3 Four from: 4

Static data is data that is unchanged


A newspaper contains static data because it is read but not edited / changed
by the reader
There is limited amount of information in a newspaper / static data
As soon as it is printed a newspaper cannot have information added to it
In a newspaper information tends to be reliable as it has been checked
thoroughly before printing / does not have users / readers able to amend it
Static data tends to go out of date quickly / not up to date.

Question Answer Marks

4 Five from: 5

Sampling resolution is the number of bits per sound sample


Sampling resolution is the maximum accuracy of each measurement taken of
a wave form when creating an audio file
The higher the sampling resolution the more accurately the wave form will be
converted from analogue to digital
The higher the sampling resolution the greater the size of the file
Digital audio is normally found in 8 bit or 16 bit resolutions
8-bit resolution was used in the earliest sound cards and is used for some
lower-quality recording formats as well
each sound sample can take one of 256 different values
which is not generally considered enough resolution to accurately represent
music audio
16-bit resolution is the standard for compact disc audio and newer sound
cards
Each sample can take one of 65 536 different values
more than any human can readily discern
These values are all per channel
For stereo audio two channels are needed
This doubles the sampling and memory requirements
The higher the sample resolution, the more accurate the representation of the
level of each sample but more memory is required to store each sample.

© UCLES 2019 Page 4 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

5(a) One mark: 4

It is a part of a computer system that consists of data or computer instructions

Three from:

System software is a type of computer program that is designed to run a


computer’s hardware and application programs
Examples are utilities, operating systems, compilers, interpreters, assemblers,
linkers and device drivers (must have two)
Application software is a program or group of programs that is designed for
the end user
Examples are database programs, word processors, web browsers and
spreadsheets (must have two).

5(b) Three from: 3

Software is cheaper as it is mass produced / do not have to employ


programmers to write software for specific tasks
It will be available straight away
Testing has been rigorously carried out by the developers so there are unlikely
to be any bugs
There will be many sources of support
Support includes helplines with operators who will already have had to deal
with a wide range of problems.

5(c) Three from: 3

May be difficult to adapt to the particular use required by the school


May have several distracting extra features unsuitable for the use it is to be
put to
May not necessarily be compatible with the existing system and software used
Some functions peculiar to the school's needs may not be available.

5(d) Four from: 4

The secretary enters the data twice


The computer stores the data on its hard disk / SSD and compares it with the
data that is entered the second time
generates an error message if the second entry does not match the first
Alternatively two people type in the data
The computer compares the two versions
freezing the keyboard if there is a difference
Comparing the data on the screen against the original paper document
checking for mistakes
Printing out a copy of the data and comparing the printout to the original paper
document checking for mistakes.

© UCLES 2019 Page 5 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

6 Eight from: 8

Absolute and relative cell referencing makes sure you only increment the parts
of a formula you need to
allows you to change prices / costs of individual items to see the effect
Cell protection makes sure that the cells you want do not change by
accident
such as fixed costs such as overheads
User interface forms makes it easier to input quantities / costs into the model
Macros make it easier to create more complex formulae or functions
such as comparing different costs simultaneously
Automatic re-calculation means it is not necessary to evaluate a formula every
time you change it
such as changing individual costs / prices
Conditional formatting allows you to highlight certain values that match
specific criteria
such as seeing at a glance which items are making a profit
Values can be changed to ask whatif questions
Graphs can be used to show trends and illustrate forecasts
such as which goods are likely to make profits over time
Goalseek can be used to determine which variables need to be changed to
achieve a target or goal
such as how many goods need to be sold / what price needs to be charged
to make a given profit.

Question Answer Marks

7 Six from: 6

This type of encoding is used to reduce the size of audio and video files
Encoded media file is sometimes similar in quality to the original but has much
smaller file size
however, video compression can be lossy
the compressed video lacks some information present in the original
video
decompressed video has lower quality than the original as there is
insufficient information to accurately reconstruct the original video
Each audio and video file format has a corresponding coder-decoder / codec
program
The codec is used to code it into the appropriate format and then decodes for
playback
Encoding involves the use of a code to change original data into a form that
can be used by an external process
Encoding / decoding often refers to the process of analogue-to-digital / digital-
to-analogue conversion
Can apply to images, audio, video, signals from sensors / control systems.

© UCLES 2019 Page 6 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

8(a) Four from: 4

CustomerID is selected as primary key in Customer Table and ID is selected


as primary key in Car Table
Click on relationships in (database) tools
Click on add tables and select Customer Table and Cars Table
Drag CustomerID onto CustId
Enforce referential integrity / Click on save changes.

8(b) 6
Field: FamilyName FirstName Phone Engine Residence Make

Table: Customer Customer Customer Car Customer Car

Sort:

Show: 9 9 9 9

Criteria: <1.8 Chorlton

or:

1 mark for 6 correct fields


1 mark for all correct matching tables
2 marks for 4 correct ticked fields, 1 mark for three correct / five (of which four
are correct fields)
1 mark for <1.8 under Engine
1 mark for Chorlton under Residence

© UCLES 2019 Page 7 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

8(c) Six from: 6

A format check tests to see if the data is in the correct format such as 5 digits
followed by a space followed by 6 digits for the Phone field
Would be impossible to apply here as all the licence plates all follow a different
pattern
such as 3 letters followed by a space then 3 digits VSE 648, 2 letters
followed by a space then 5 characters SB A5526, 4 digits followed by a space
then 2 letters then a space then 2 digits 1233 CD 33

A length check tests to see if data is usually exactly a given number of


characters such as 5 in the CustomerID/CustId field or 12 in the Phone field
Would be difficult to apply here as all the licence plates are different lengths
here
such as 7 for VSE 648, 8 for SB A5526, 11 for 12333 CD 33
Could have a range in the length check but this would not prevent 9 or 10
characters being entered in error – there are no 9 or 10 character licence
plates here

Lookup check could be used on Make in Car table as there would probably be
a limited number of car makes
Almost impossible to apply here as there are so many possible licence plate
numbers

Must have three validation checks to get 6 marks.

Question Answer Marks

9(a) =SUM(C4:E4) 1

9(b) =IF(I4<1000000,"very bad year",IF(K4/I4<0.1,"bad year","good year")) 6

Nested IF with correct brackets and no absolute cell referencing 1 mark


I4<1000000 1 mark
Returns very bad year 1 mark
IF (K4/I4<0.1 1 mark
Returns bad year 1 mark
IF (K4/I4>=0.1/otherwise returns good year 1 mark

9(c) =AVERAGEIFS(C4:C13,A4:A13,C15,A4:A13,D15) 6

=AVERAGEIFS() 1 mark
(C4:C13 1 mark
,A4:A13 1 mark
,C15, 1 mark
A4:A13 immediately after ,C15, 1 mark
,D15) 1 mark

© UCLES 2019 Page 8 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

10 To be marked as a level of response: 8

Level 3 (7–8 marks)


Candidates will describe the advantages and disadvantages of both types of
network.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a structured
and coherent format.
Specialist terms will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will describe the advantages and disadvantages of at least one
type of network although development of some of the points will be limited.
For the most part the information will be relevant and presented in a structured
and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only address one side of the argument and give basic
advantages / disadvantages.
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to e.g.

Client-server:
A centralised database of usernames and passwords on a server makes
client-server networks more secure
In a client–server network, if the server goes the down whole network gets
affected
With a client-server network users do not need to worry about making
backup
this is managed centrally by a network manager
Upgrading the network is easier with a client-server network as it is easier to
just upgrade the server
Easier for users to access the server in a client-server network using
alternative devices
As new information is uploaded in a database, each computer need not have
its own storage capacity increased as may be the case in peer-to-peer
networks

© UCLES 2019 Page 9 of 10


9626/13 Cambridge International AS/A Level – Mark Scheme May/June 2019
PUBLISHED

Question Answer Marks

10 Peer-to-peer:
There is no need to pay for a network manager with a peer-to-peer network
With a peer-to-peer network you do not have to worry about buying expensive
hardware such as servers
does not need a server because individual workstations are used to access
the files
With a peer-to-peer network everything is decentralised so it is more difficult to
manage the network
Much easier to set up than a client-server network as it does not need
specialist knowledge
Because each computer might be being accessed by others it can slow down
the performance for the user unlike client-server
The over-all cost of building and maintaining this type of network is
comparatively cheaper.

Question Answer Marks

11 Eight from: 8

Static parameter query is a query that is fixed


A dynamic parameter query can be used to search for different values each
time it is run
In a static query every time that the query is run it will search for the same
data
If different data is to be searched for the user would need to open up the
query in design view
and change the data in the criteria to that required
With a dynamic parameter query you can type in different data each time
Every time the query is run a dialogue box appears asking the user to type in
the data required
This would save the time of designing the query every time different data is
required
Dynamic parameter query requires less technical knowledge of the user
If the only city that the country deals with is Beijing then a static query would
be fine
It is unlikely that this is the case and if it wants to know customers from
different cities quite quickly a dynamic query would be better.

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 0 5 3 6 8 3 1 8 1 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory February/March 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (JP/CB) 164153/3
© UCLES 2019 [Turn over
2

1 Tick the four statements, referring to different types of application software, which are true.

You can use word processing software to create tables of data

You can only use database software to create reports

Spreadsheet software can be used to produce charts

You must always use web authoring software when creating web pages

Financial modelling can involve the use of spreadsheet software

Video editing software cannot be used to edit a music soundtrack

Word processing software can include multimedia features

You can only create data forms using database software

Photo editing software is only used to edit photos


A management information system (MIS) is a form of database management
system
[4]

2 Tick the four most accurate statements, referring to the digital divide.

The digital divide can exist between the educated and uneducated
The digital divide can exist between those living in rural areas and those living in
urban areas
The digital divide does not exist between people from different economic classes

Everyone these days owns a smartphone so the divide is closing rapidly


Minority groups have no difficulty performing transactions on smartphones
thereby reducing the divide
Disabilities of potential internet users constitute another type of digital divide

Some less developed countries have limited access to digital services

Most tribal communities have universal mobile phone coverage in their community

The digital divide only refers to those who can and cannot access the internet

The price of connection to the internet tends not to vary between countries
[4]

© UCLES 2019 9626/12/F/M/19


3

3 A student is researching the topic of her new assignment. She has been provided with a series of
hard copy magazine articles. She has been told by her tutor that these are probably more reliable
than searching the World Wide Web for information.

Compare and contrast the use of these two types of data sources for her research.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/12/F/M/19 [Turn over


4

4 There are many types of systems software including interpreters and device drivers.

(a) In order for a computer to output to a printer it uses a printer driver. This is just one of many
device drivers a computer uses.

Explain the purpose of device drivers.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Describe the function of an interpreter.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/12/F/M/19


5

5 A teacher has reminded her students to proof read their assignments before they hand them in.

Define the term ‘proof reading’.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

6 Many mobile phone companies, in the past, persuaded customers to move from 3G to 4G.

Compare and contrast 3G and 4G technologies.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]
© UCLES 2019 9626/12/F/M/19 [Turn over
6

7 Mumbai Stores is a company which has a chain of shops. The company stores the customers’
reference number, and the value of the goods they have purchased, in a transaction file. Any
payments the customers have made on their account at the end of the month are also stored in
the same file.

Parts of the Transaction file and Master file are shown.

The Goods_bought field contains only the value of goods bought using the account’s credit
facilities.

The Master file shows the customers reference number, the money they owe from the previous
month (Old_balance) and the money they now owe (New_balance).

The New_balance has to be calculated by using the Old_balance, Goods_bought and any
Payment made. All these values are in rupees.

Transaction file Master file


Customer_ref_no Goods_bought Payment Customer_ref_no Old_balance New_balance

943201 5500 4000 256431 0


256431 3800 3800 319852 10000
319852 9200 10000 433303 5000
433303 3200 5200 590871 4500
590871 4300 6800 599812 0
612759 3700 3700 612759 0
650897 2300 2300 650897 0
698915 4000 6600 678945 6800
751654 4400 4400 698915 2600
804782 5200 8200 712356 5100
751654 0
804782 4200
943201 0
963584 2400

© UCLES 2019 9626/12/F/M/19


7

(a) Describe the processes that must happen to the Transaction file before the Master file can be
updated.

. ..................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

. ..................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Using this data, explain how the Master file is updated using the Transaction file shown. You
may assume that the only transaction being carried out is the calculation of the New_balance.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 9626/12/F/M/19 [Turn over


8

(c) Each customer has a credit limit of 20000₹. Customers must make a payment of at least
2000₹ each month.

Using examples from the Transaction file, explain why it would be appropriate to use a range
check on one field and a limit check on another field.

Please note, the Customer_ref_no is stored as text.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/12/F/M/19


9

8 Rishu has been asked by the directors of the company she works for to set up a fully functioning
video-conferencing room. It will be used by several workers at the same time to communicate with
the directors who will be in a different building.

Describe, including a use of each item, the hardware she will need to purchase.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/12/F/M/19 [Turn over


10

9 Describe the differences between health issues and safety (apart from e-safety) issues experienced
by employees in an IT-based work environment.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/12/F/M/19


11

10 Jasvir owns a gardening equipment hire shop. She has developed a simple database system
which contains information about the equipment. Each record contains the following data:
Equipment_name, Manufacturer, Equipment_code (a six character code), Hire_price, Number_
of_days_hired, Date_hired, Customer_number and Loyalty_customer (Y/N).

Design an appropriate online data entry form for one item of equipment, clearly indicating the
amount of space required for each field. Use the computer screen shown below for your design.
Where appropriate allow the user to enter data by clicking the mouse rather than entering text.

[8]

© UCLES 2019 9626/12/F/M/19 [Turn over


12

11 Juanita is the company secretary of a small business in the USA. She has created a spreadsheet
to calculate the payroll.
The spreadsheet is shown below.

A B C D E F G H I J K L
1 Roles
2 L F OS M D
Office
Labourer Fitter Manager Director
3 secretary
4 $15 $25 $22 $40 $80 Hourly rate
5 Job codes Job title Hours worked Weekly pay
6
7 John Vercoe L Labourer 40 $600
8 Lauren Hall OS Office secretary 38 $836
9 Chloe Rhodes F Fitter 39 $975
10 Owen Williams OS Office secretary 42 $924
11 Lotte Charles L Labourer 35 $525
12 Jeannie Burke OS Office secretary 38 $836
13 Jimmy Lee F Fitter 40 $1,000
14 Dawid Jones F Fitter 32 $800
15 Li Sun Wu M Manager 45 $1,800
16 Charlotte Watson D Director 50 $4,000
17 Joe Norfolk M Manager 41 $1,640
18 Joanne Floyd F Fitter 38 $950
19 Anthony Campbell F Fitter 40 $1,000
20 Linda Stuart L Labourer 38 $570
21 Kate Smith L Labourer 37 $555
22 Sam Smith OS Office secretary 40 $880
23 Duncan Rydell L Labourer 36 $540
24 Tony Thomson L Labourer 37 $555
25 Dougie Ryder OS Office secretary 41 $902
26

(a) She has created a named range Roles

Describe how she created this named range.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/12/F/M/19


13

(b) She entered a formula in E7 using the named range and the information in column B to
calculate the weekly pay for John Vercoe.

Write down the formula she used. This formula should be easy to replicate.

= ................................................................................................................................................

............................................................................................................................................. [6]

You can use the space below for any working you need.

© UCLES 2019 9626/12/F/M/19 [Turn over


14

12 A recent development in backing storage of laptop computers has been the increased use of solid
state drives (SSDs). However hard disk drives (HDDs) are still used in many laptops.

Evaluate the use of SSDs and HDDs for storing data in laptop computers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/12/F/M/19


15

13 Encryption can be used to protect data on a hard disk and in emails.

Evaluate the need for this encryption.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/12/F/M/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/12/F/M/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 0 7 6 9 0 5 4 2 4 1 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory February/March 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all the questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (RW/CB) 164157/3
© UCLES 2019 [Turn over
2

1 Errors in JavaScript code can cause the code to fail to execute when run by a web browser. The
code shown is intended to display a table on a web page when run in a web browser.
The line numbers are shown only for your convenience when referencing the code in your
answers.

1 <html>
2 <body>
3 <script language="JavaScript">
4 tableout = "<table border='1' width='300' cellspacing='0'
cellpadding='3'>"
5 for (b = 1; b <= 10; b++) {
6 tableout = tableout + "<tr>":
7 for (g = 1; g <= 10; g++) {
8 tableout = tableout + "<td>" + b * g + "</td>";
9 }
10 tableout = tableout + "</tr>";
11 }
12 tableout = tableout + "</table>";
13 document.write (tableout);
14 </script>
15 </body>
16 </html>

(a) The code does not run as intended in web browsers because there is an error in the code.

Describe how the error in the code prevents the web browser from running as intended.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/32/F/M/19


3

(b) Errors can be ‘trapped’ in order that the performance of the web browser is not affected.

Explain how you can use error handling techniques to trap errors in JavaScript code.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/32/F/M/19 [Turn over


4

2 (a) Describe the characteristics of online tutorials.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Two types of online tutorial are ‘recorded’ and ‘interactive’. ‘Recorded’ tutorials do not require
user input, but ‘interactive’ tutorials do.

Describe the differences between these two types of online tutorial.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/F/M/19


5

3 Evaluate the use of quantum cryptography when transmitting confidential data over public
networks.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/F/M/19 [Turn over


6

4 Layers can be used when editing digital images.

(a) Describe what is meant by a ‘layer’ in computer graphics.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe how layers could be used to enhance a digital image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/F/M/19


7

(c) Discuss the impact on society of the use of image editing on photographs in fashion
magazines.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 9626/32/F/M/19 [Turn over


8

5 3D printing is used in medicine.

(a) Describe two benefits of being able to produce artificial blood vessels by 3D printing.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe how 3D printing could be used, apart from producing drugs at home, to improve the
effectiveness of the manufacture of prescription drugs.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/F/M/19


9

(c) Describe the drawbacks of using 3D printing at home to produce prescription drugs.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/F/M/19 [Turn over


10

6 A company sells glass for installation into rectangular windows. The company cannot make glass
for windows with dimensions smaller than width 12 cm and height 8 cm. The price of a window
is calculated by working out the area of the window and multiplying it by the cost per square
centimetre (cm2), which is 20₹.

a
Area of window = a × b
Price = area × cost per cm2
b

A spreadsheet with formulas has been created to carry out these calculations.

A B C D
1 These cells will be validated
using a range check
2 Input a 14 cm
3 Input b 9 cm
4
5
6 Area is: 126 cm2
7 Cost per cm2 is: 20 rupees
8 Price is: 2520 rupees
9
10

© UCLES 2019 9626/32/F/M/19


11

A test plan must be created to fully test the spreadsheet before the company use it.

Use this table to design a suitable test plan for this spreadsheet.

[8]
© UCLES 2019 9626/32/F/M/19 [Turn over
12

7 Evaluate ways of combatting spyware.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/F/M/19


13

8 The owners of a bank are replacing its current system by transferring all accounts and processes
to a new computer system. They have to be sure that the new system will carry out all the functions
of the old system.

It is essential that there is no interruption in the services provided by the bank’s computer system
to its staff and customers.

Choose the most appropriate method of implementation and explain how the new system will be
implemented.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/F/M/19 [Turn over


14

9 The manager of a small shop is creating a new relational database that will store details of the
goods sold by the shop. It will also store details of the suppliers of these goods. The manager
collects the details that are shown on the labels attached to the goods. He gathers the details of
the suppliers from a notebook that he keeps. Five examples of labels are shown:

Item Beans Item Flour


Quantity in pkt 100 g tin Quantity/pkt 2 kg sack

Price $2 Price $3
Sell by date N/A Sell by date Dec 2019

Cost per 1000 g $20

Item Sugar Item Soya


Quantity in pkt 2 kg bag Amount in pkt 1000 g bag

Price $3 Price $5.46


Sell by date March 2020 Cost per 1000 g $5.46
Sell by date 20 Nov 2019

Item Rice
Quantity/pkt 5 ½ kg sack

Price 440 cents


Sell by date 07 June 2029

The shop can obtain all of its goods from any of these four suppliers:

Shop Suppliers Inc Sugar Suppliers plc General Shop Cash & Carry Goods
Bury St Edmunds Wholesalers
PO Box 2300 2500 Newmarket Rd 65a Board View
Suffolk Cambridge
Pennsylvania Av IP66 7ES CB6 5PE Milford Haven
Washington DC Dyfed
United Kingdom
20500 UK
SA85 2NX

© UCLES 2019 9626/32/F/M/19


15

Create a suitable data dictionary for the new relational database to store the shop’s goods and
supplier details.

[8]

© UCLES 2019 9626/32/F/M/19 [Turn over


16

10 An international organisation provides communication services over the internet. It enables


customers to communicate messages confidentially between their offices in different countries.

It uses message, circuit and packet switching technologies for the communications.

Describe the differences between these three technologies as used in communicating these
messages.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/F/M/19


17

11 A company has developed a new product. Its market research department has decided to use
chat rooms to gather information from potential customers about the product.

Explain why they would use a chat room rather than other social networking methods to gather the
customer information.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/32/F/M/19


18

BLANK PAGE

© UCLES 2019 9626/32/F/M/19


19

BLANK PAGE

© UCLES 2019 9626/32/F/M/19


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/32/F/M/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory March 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2019 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

1 4
You can use word processing software to create tables of data 3

You can only use database software to create reports

Spreadsheet software is used to produce charts 3

You must always use web authoring software when creating web
pages

Financial modelling can involve the use of spreadsheet software 3

Video editing software cannot be used to edit a music soundtrack

Word processing software can include multimedia features

You can only create data forms using database software

Photo editing software is only used to edit photos

A management information system (MIS) is a form of database


3
management system

© UCLES 2019 Page 3 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

2 4
The digital divide can exist between the educated and uneducated 3

The digital divide can exist between those living in rural areas and
3
those living in urban areas

The digital divide does not exist between people from different
economic classes

Everyone these days owns a smartphone so the divide is closing


rapidly

Minority groups have no difficulty performing transactions on


smartphones thereby reducing the divide

Disabilities of potential internet users constitute another type of


3
digital divide

Some less developed countries have limited access to digital


3
services

Most tribal communities have universal mobile phone coverage in


their community

The digital divide only refers to those who can and cannot access
the internet

The price of connection to the internet tends not to vary between


countries

Question Answer Marks

3 Six from: 6

Max five from:

Static information sources/magazines are more carefully checked for


accuracy
Once the data are created they cannot be changed easily
There is a limited amount of information in a static information
source/magazine/greater amount of information on the World Wide Web
As soon as static data source/magazine is created it is very difficult to have
information added to it
A dynamic data source/website can have information updated quite quickly
The data in a dynamic data source/website is usually up to date/ static data
tends to go out of date quickly
There can be many contributors to a dynamic data source/website so the
information can be inaccurate

Must have at least one from:


Both sources require the use of sophisticated analysis techniques
Both sources will provide a mixture of relevant and irrelevant information.

© UCLES 2019 Page 4 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

4(a) Four from: 4

It operates/controls a device attached to the computer


Without the required device driver, the corresponding hardware device fails
to work
It is an interface between operating systems/applications software and the
device
Tells the operating system how to communicate with the hardware device
Upon installation it detects and identifies the peripheral device
Wakes up the device when it is needed and puts it back to sleep when it is
not
Handles the translation of requests between a device and the computer
Defines where outgoing data must be stored before it can be sent
At least two examples of device drivers.

4(b) Four from: 4

Directly executes instructions of a high-level language program


Translates a high-level language program into an intermediate stage
Translates each line of source code and then executes that line/statement
Reports on errors as lines of source code are entered
An interpreter has to be resident in memory in order for the program to run.

Question Answer Marks

5 Four from: 4

Proof reading is the careful reading and rereading of a yet to be finally-


printed document
To detect any errors and mark corrections
It is a relatively slow and methodical search for errors
Errors such as spelling mistakes, typographical mistakes and grammatical
errors (must have at least two)
Also checks for omitted words or word endings
It may also involve checking of different elements of a layout
Checking headings, illustrations and colours
Good description of how proof reading is carried out.

© UCLES 2019 Page 5 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

6 Six from: 6

Similarities:
Both are types of mobile network
Both allow smart phones to access the WWW
Both allow video calling on phones
Both allow emails to be sent by phone
Both allow videos and music to be downloaded to a phone
Both allow phones to be used as a SATNAV

Differences:
4G has faster download speeds than 3G
4G enables smoother browsing with web pages failing to load, very rare
unlike 3G
4G allows videos and music to be streamed without the buffering and
freezing found on 3G networks
Batteries last longer on 3G than on 4G
3G data allowance tends to be cheaper than 4G

Must have at least one of each to gain full marks.

Question Answer Marks

7(a) Two from: 2

Transaction file is validated


Transaction file must be sorted
in same order as master file/sorted on Customer_ref_no

© UCLES 2019 Page 6 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

7(b) Six from: 6

First record in the transaction file read


belonging to 256431
Reads first record in the old master file
belonging to 256431
These two records are compared
If records do not match computer writes master file record to new master
file
next record is read from master file and these two records are compared
and process is repeated
Records match so transaction is carried out
Computer calculates the New_balance, Old_balance + Goods_bought –
Payment
0 + 3800 – 3800 (0)
Using Old_balance, 0 from master file
Using Goods_bought 3800, Payment made, 3800 from transaction file
Processed record is written to new master file
Next record is read from transaction file
belonging to 319852
then compared to next master file record
... belonging to 319852
This continues until the last record from the transaction file record is read
belonging to 943201
After processing the last record of the transaction file
belonging to 943201
all the remaining old master file records are written to the new master
file
in this case, one record 963584.

7(c) Five from e.g.: 5

Use a range check on the Payment field between 2000 and 20000
As customers must make a payment of at least 2000₹ and customers have
a credit limit of 20000₹
Have a limit check on the Goods_bought field as they cannot be more than
20000₹
customers have a credit limit of 20000₹
It is impossible to spend less than 0₹
so a lower limit to the range is unnecessary
A limit check has only one limit but a range check has two – an upper and
lower limit

There are alternative answers if fully reasoned.

© UCLES 2019 Page 7 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

8 Six from: 6

Server/computer to handle video-conferencing software


Laptops/PCs/tablets for each participant to enter data
Microphones to input participants’ voices/sound
Large screen/monitor so that all the directors can be seen
Speakers for participants to hear what the directors are saying
Cameras to input pictures of participants
Router to connect to internet/codec to connect to telephone network.

Question Answer Marks

9 Six from: 6

Health issues arise from long term use of computers


Safety issues can result in a sudden accident/can result in serious injury

Health issues tend to be RSI/carpal tunnel syndrome, lower back pain, eye
strain, headaches, upper back pain, neck pain, shoulder pain (must have at
least two)

Health issues can be caused by:


Max two from:
Typing at a keyboard continuously
Gripping a mouse and repetitive clicking
Sitting in the same position/with wrong posture all day
Staring at a computer screen continuously/all day
Glare from screen

Safety issues tend to be fire hazards, electrocution, personal injury (must


have at least two)

Safety issues can be caused by:


Max two from:
Overloading sockets causing overheating
Overheating of computers
Water spilt on to live wires
Handling bare wires,
Trailing cables can cause users to trip up
Heavy objects falling off tables.

© UCLES 2019 Page 8 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

10 Eight from: 8

Inclusion of all eight fields mentioned in question


Must be text boxes or individual character boxes
Equipment_name and Manufacturer space bigger than Equipment_code
and Hire_price and generally sensible spacing
Drop down dates for Date_hired or clear view of calendar
Radio buttons for Loyalty_customer (Y/N)

Navigation buttons (at least 2)


Help button/information on how to complete the form
Appropriate title
Appropriate white space and information fills the page.

Question Answer Marks

11(a) Select G2:K4 1

Click the Name box at the left end of the formula bar 1

Type Roles and press enter 1

Or

Select G2:K4 1

On the Formulas tab, in the Defined Names group, click Define Name 1

In the New Name dialog box type Roles and press enter 1

11(b) =D7*HLOOKUP(B7,Roles,3,FALSE) 6

D7* outside the brackets 1 mark


HLOOKUP() 1 mark
(B7 1 mark
,Roles 1 mark
,3 1 mark
FALSE) 1 mark

Items must be in correct position to gain a mark.

© UCLES 2019 Page 9 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

12 Eight from: 8
Evaluation based on:

Advantages of HDDs/Disadvantages of SSDs:


Hard disks tend to have higher storage capacities than SSDs
Hard disk drives still cost less per gigabyte than SSDs
HDDs last longer than SSDs
The NAND flash used in SSDs can only be used for a finite number of writes
The choice and availability of SSDs is still limited compared to HDDs

Disadvantages of HDDs/Advantages of SSDs:


Hard disk drives are more susceptible to shock and damage
as there are moving parts
SSDs have faster data transfer rate
SSDs have quicker boot ups
SSDs can have almost instantaneous data access
HDDs data access speeds is dependent on how close the data is to the
read/write heads
All parts of the SSD can be accessed at once
SSDs use significantly less power at peak load than hard drives
SSD's energy efficiency can deliver longer battery life in laptops than HDDs
With no moving parts SSDs run at near silent operation unlike whirring hard
disk drives
SSDs weigh considerably less than hard drives
SSDs make laptops more portable

Must have at least one from each to gain full marks.

© UCLES 2019 Page 10 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

13 Level 3 (7–8 marks) 8


Candidates will describe the advantages and disadvantages of both uses of
encryption.
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately.

Level 2 (4–6 marks)


Candidates will describe the advantages and disadvantages of both uses of
encryption although development of some of the points will be limited.
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)


Candidates may only address one use of encryption, and give basic
advantages/disadvantages.
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)
Response with no valid content.

Candidates may refer to, e.g.

Disk encryption:

Advantages
Files encrypted by one user cannot be opened by another user if they do not
possess appropriate permissions
After encryption a file remains encrypted regardless of where it is moved
Encryption can be used on any files including executable files
Users with permission to decrypt a file are able to work with the file without
experiencing any restrictions/difficulties
Other users receive a restricted access notification when they attempt to
access the encrypted file

Disadvantages
If the password is lost or reset it becomes impossible to gain access to files
on the drive
If the operating system fails it becomes impossible to gain access to files
If the operating system has to be reinstalled it becomes impossible to gain
access to files...
...data can be lost irreversibly

© UCLES 2019 Page 11 of 12


9626/12 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

13 Email encryption:

Advantages
As modern technology becomes more sophisticated, so do hackers so
sophisticated encryption is essential
Passwords on email accounts are not enough
Email providers tend not to automatically encrypt email messages nor
attachments
Without encryption a person/malware could potentially read someone's
emails
The recipient’s email provider server may not be secured
Without encryption, messages can be stored as plain text, making it easy for
anyone to read and understand
When encrypting emails, the text stored in the message and files are
scrambled up both in storage and transit...
...the only way to unscramble and read the content is to use a decryption
key

Disadvantages
Hackers can still intercept and delete emails
Encrypting emails to a new recipient using a private key requires the key to
be sent which can be intercepted by a hacker
Managing digital certificates can become complex and time consuming.

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory March 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the March 2019 series for most Cambridge
IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level components.

This document consists of 9 printed pages.

© UCLES 2019 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

1(a) Two from: 2

A colon (:) is shown instead of a semi-colon (;) in line 6


...this is a syntax error
Syntax errors prevent JavaScript from being executed/are fatal errors in
code
The web browser displays nothing at all from this code
The variable ‘tableout’ has not been declared before it is used
Some browsers will ignore/compensate/interpret this differently from others
Results can be different/unexpected in different browsers.

1(b) Five from: 5

Add specific code to deal with the errors transparently/without affecting the
web browser
Specify block of code to be tested
Add some code produce output that depends on (the type of) error
encountered
Use try() block of code to be tested
Use catch() to define the error handling code
Use final() to allow code to be executed/run
Use throw() to display information about the error/error message
Specify the text to be displayed on screen as a result of the error.

Question Answer Marks

2(a) Two from: 2

A self-study activity
Has a specific learning outcome
Delivered via internet/network.

2(b) Four from: 4

Recorded tutorial uses video/audio only in a linear sequence/one route


through
Interactive tutorial is a set of structured (web) pages/slides
Navigated by different routes/routes chosen by the learner
Interactive can use any combination of text/images/video/audio/animations
in any order
No user input required in recorded/user input required/mandatory in
interactive tutorials.

© UCLES 2019 Page 3 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

3 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)

Candidates will evaluate/explain in detail the benefits and drawbacks of the


use of quantum cryptography when transmitting confidential data over public
networks.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain the benefits and drawbacks of the use of quantum
cryptography when transmitting confidential data over public networks.
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)

Candidates will describe a benefit and/or drawback of the use of quantum


cryptography when transmitting confidential data over public networks.
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

Allows use of cryptographic tasks that would be deemed impossible without


the use of quantum cryptography, e.g. the guarantee that any
interception/viewing/eavesdropping on/disturbance of the data is detected
Calculations can be carried out extremely rapidly so much higher bi-length
for keys can be used so increasing security of data when encrypted
Does not do away with conventional cryptographic keys i.e. a mathematical
algorithm is still needed for the actual encryption of the data
Uses photons to carry data in terms of their ‘spin’ which is difficult to
control/generate consistently/precise filters to determine the spin are difficult
to manufacture/deploy
Requires extremely pure fibres to transmit photons intact/undisturbed over
anything but short distances – maximum so far is about 60 km/far shorter
distance than conventional fibre use can reach
Requires a new type/generation of computers to become a viable reality
In theory, quantum techniques can break any encryption in a usefully short
time.

© UCLES 2019 Page 4 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

4(a) One from: 1

Level at which an object/file is placed in an image


Represents part of a graphic/image as pixels (in a bitmap).

4(b) Four from: 4

Can have transparency to allow other layers to show through/be seen


Can be overlapped to create a composite image
Can be replicated to show multiple instances of same image/object
Can be replicated to hide/mask parts of an image
Can be used to adjust the brightness/saturation of other layers.

4(c) Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.

Eight from e.g.:

Editing can enhance attractiveness/look/appearance of items/models


Editing can attract attention of viewer to compensate for reduction in
attention span in recent years
Editing can make poor photos appear neat/presentable to clients/customers
to increase sales
Less expensive than taking exact/precise/perfect photographs
Removing blemishes, wrinkles, flabby parts/altering body shape is flattering
to the model/clothes

A false/unrealistic body image can be created


Viewing of only perfection in clothes/models can lower viewers self-esteem
...cause eating disorders
...cause unnecessary pressure to confirm to unrealistic ideals
Editing can be time consuming /tedious and slow down production.

Question Answer Marks

5(a) Two from: 2

No need to wait for real/native blood vessels to grow into implanted


/repaired tissue
Allows oxygen/O2 to be supplied immediately to implant which is more likely
to survive/grow
Vessels can be customised for the individual organ which is more likely to fit
Less likely to be rejected by recipient than real blood vessels.

© UCLES 2019 Page 5 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

5(b) Four from: 4

Chemical components of the drug can be customised at molecular level to


individual patient
Drug can be customised to deal with patient specific issues/ethnic
origin/DNA
A chemical blueprint can be created so that the drug can be printed at any
pharmacy/druggist/drug store
...using specific components/compounds
Drug can be personalised for/targeted to a specific illness/infection.

5(c) Four from: 4

Human errors in use of blueprints/mislabelling can lead to incorrect drug


being created
...incorrect dosage being used
Difficult to validate/verify drug creation so, e.g. incorrect base materials may
be used
Difficult to regulate use of the drug/printing machines across (international)
borders
Difficult to regulate the supply of the drugs once blueprint is
published/available to patient
Bio-safety/hygiene/sanitary/cleanliness of production difficult to control at
home
Could be used/customised to produce illegal drugs.

Question Answer Marks

6 Eight from: 8

Max Five for column headings from e.g.:

Test Number/No.
What is being tested
Type of test data used
Expected result
Actual result
Comments on results
Action (to be) taken

Max Four for Tests from e.g.:

Use of normal, extreme and abnormal data for inputs a and b/in cells B2 and
B3
Example data given/used for test
Test of (any) message that appears when invalid data entered
Calculation of area by formula in cell B6
Calculation of total price by formula in cell B8.

Maximum of 8 marks in total.

© UCLES 2019 Page 6 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

7 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.

Eight from:

Use of anti-spyware software will prevent spyware being installed


May not detect spyware already installed
May not detect spyware disguised as legitimate feature of another
program/application
Use of antivirus software – will detect and remove some spyware but not all,
so has limited effectiveness when used on its own
Real time scanning of incoming programs/applications/data can provide
protection by blocking spyware from entering the system provided the
spyware is recognised/in its database/can be analysed to be spyware
Dedicated anti-spyware can detect and remove spyware provided all areas
of system are regularly scanned
Lists of spyware must be up to date
Options may include option to manually delete files if anti-spyware is
‘uncertain’ of status of detected file/data
Spyware may resist attempts to be deleted/uninstalled
May recreate another running process to reinstall itself once deleted by anti-
spyware software
Using alternative web browsers may prevent spyware being installed as
some are more vulnerable than others
Web browsers are not designed to detect spyware
Using reputable sources for download of software may help prevent
spyware being installed
Reputable sources can be ‘infected’
Use of combination of methods is most successful but takes awareness and
time to implement
Using a firewall to prevent spyware from returning data to the spyware
source

One mark is available for a valid reasoned opinion/conclusion.

© UCLES 2019 Page 7 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

8 Eight from: 8

Install and start the new system alongside the old system
Copy/set up all accounts services to the new system
Allow some staff and some/new customers to use services on new system
Switch all services to new system once it is installed and running
Compare results from new system/performance of new system with
old/current system over a period of time
Period of time long enough to test/try all provided services
Keep old/current system running to ensure that no features are lost/in case
new system fails
Ensure that all services are duplicated properly/in full
No perceived difference in services by staff or customers
Revert to old/current system if new system needs to be
updated/amended/maintained during testing/parallel running time period
Once new system has proved successful complete switch to new system
Retain old system as backup in case of failure of new system for a period of
time/archive.

Question Answer Marks

9 Entities with attributes include: 8

Four from e.g.:


Item text
Quantity real number validation
Type of packet text
Price real number/currency validation
Cost per 1 kg/1000 g real number/currency formula
Sell by date date validation

Four from e.g.:


Name of supplier text
Address line 1 text
Address line 2 text
Address line 3 text
Address line 4 text
Zip/Postal code text validation

Mark allocation:

max 5 goods entities


max 4 supplier entities
max 3 for correct attributes
max 3 for correct indication of any validation required.

© UCLES 2019 Page 8 of 9


9626/32 Cambridge International AS/A Level – Mark Scheme March 2019
PUBLISHED

Question Answer Marks

10 Eight from: 8

Packet switching breaks the message into discrete data packets whereas
message and circuit may not do so
Packet switching can introduce delays as packets may travel via different
routes whereas message and circuit switching do not
Packet and message switching make more efficient use of the capacity of
the transmission medium than does circuit switching
Circuit switching keeps the circuit connected for the whole of the duration of
the transmission whereas message and switching do not
Circuit switching uses the full bandwidth of the transmission medium
whereas message and packet switching do not
Circuit switching can guarantee a higher quality of service compared to the
other methods
Message switching can be less secure because messages are stored
(temporarily) at nodes
Circuit switching can guarantee a higher level of security of data compared
to the other methods
Others can use the same communication channel when packet switching is
used whereas this is not possible when message and circuit switching is
used.

Question Answer Marks

11 Six from: 6

Occur in real time so no delay in obtaining input from participants


Can provide a secure online environment for discussion with numbers of
participants
Can be restricted to only those chosen to participate
Participants can be in any location around the world
Participants do not have to travel/incur costs of travel/leave their home/work
location
Employees are not removed from their work place so can continue working
once chat is over
The (text-based) discussion can be saved for future reference.

© UCLES 2019 Page 9 of 9


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 6 1 0 8 5 4 6 6 9 8 *

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (CE/SG) 168823/2
© UCLES 2019 [Turn over
2

1 Tick the four most accurate statements regarding the benefits of gathering data from direct data
sources.

You only have to gather as much or as little data as you need


It allows data to be gathered from subjects to which the data gatherer does not have
physical access
You can obtain the data faster than using an indirect data source

You have full control over the method used to collect the data

A much larger sample size can be used than is possible with indirect data sources

A direct data source is quicker to search

There may be an opportunity to sell the data to other people for them to use

You do not have to spend time interviewing people or giving out questionnaires

A CD ROM of historical data is a direct data source

The source of the data is known exactly, making it easier to judge its reliability
[4]

2 Tick the four most accurate statements regarding the gathering of personal data by unauthorised
persons.

Pharming involves sending a website URL, inviting the receiver to go to the website
Smishing involves using text messages to persuade people to give out personal
information
Phishing involves installing malicious software on the victim’s computer

Pharming involves creating a fake website that looks like an actual bank’s website

Phishing involves the sending of fake emails in order to advertise the bank
Vishing involves the fraudster’s computer redirecting a customer’s phone call to his
own phone
Banks can ask you from time to time to send them your full password to check you
are authorised to use that account
Vishing involves receiving a phone call from a fraudster

Vishing never involves getting the customer to phone the bank

Smishing is the same as vishing but never involves the use of a phone
[4]

© UCLES 2019 9626/13/O/N/19


3

3 Most computer systems consist of hardware and software.

(a) Define the term ‘hardware’ in an IT context.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Giving brief descriptions of two examples, define the term utility software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

4 Using a news website as an example, describe what is meant by dynamic data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/13/O/N/19 [Turn over


4

5 When creating queries, a function IIf() is often used. A table containing a list of where people live
and their status could exist so that a query could be constructed:

IIf([Living_in]=“own home”,“own”,“other”)

This would look in a list of where people lived for the words ‘own home’ and would output the word
‘own’ if a match were found. If it was not ‘own home’ then the word ‘other’ is output.

(a) Complete the nested query that would be used to output ‘rented’ for anyone living in
accommodation owned by a landlord. This is indicated by the word ‘landlord’ in the Living_in
field (see table on page 5).

IIf([Living_in]=“own home”,“own” ..............................................................................................

............................................................................................................................................. [6]

You can use the space below for any working you need.

© UCLES 2019 9626/13/O/N/19


5

(b) Below is shown the output created from a larger database.

Describe the steps required to produce this output (from the query in part (a)), without using a
wizard.

Second_Name Name1 Living_in Status


Burke Dougie own home own
Charles David with parents other
Hoy Tony landlord rented
Lee Duncan own home own
Macdonald Lotte with friends other
Norfolk Jeannie landlord rented
Reid Laura own home own
Rydell Jenna own home own
Ryder Joe with parents other
Thomson Jimmy landlord rented

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/13/O/N/19 [Turn over


6

6 John, a user interface designer, has been asked by a systems analyst to design an interface for a
proposed information system. He will need to consider a mental model of the potential users of the
system.

(a) Describe what is meant by a mental model in this context.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Describe the features of a user interface which need to be considered when planning its
design. Where appropriate, give examples of each feature.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/13/O/N/19


7

7 A hospital has installed video-conferencing equipment so that senior doctors in the hospital can
stay in touch with other doctors who work in areas away from the hospital.

Evaluate the impact of video-conferencing on both groups of doctors.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/13/O/N/19 [Turn over


8

8 Roger has decided to set up a mail order company. He needs to create a database of customer
records and orders. He is not sure whether to create a flat file database or a relational database.

Explain the differences between a flat file database and a relational database.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/13/O/N/19


9

9 Computer networks can often be classified as consisting of two types, peer-to-peer and client-
server networks.

Describe a peer-to-peer network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

© UCLES 2019 9626/13/O/N/19 [Turn over


10

10 Expert systems often use a mixture of forward chaining and backward chaining to determine the
probable solution to a problem.

Describe the terms:

(a) Forward chaining.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Backward chaining.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/13/O/N/19


11

11 Here is a spreadsheet showing the medal winners at some of the 2016 Olympics swimming
events.

A B C D E F G H I J K L M N O P Q
Average
Code of speed
1 Country code Country name Gold Silver Bronze Swimmer Distance Stroke Gender Position country Time (secs) (m/s) Name of country
2
3 AUS Australia 1 0 1 Kyle Chalmers 100m Freestyle M 1 AUS 47.58 2.10 Australia
4 BEL Belgium 0 1 0 Pieter Timmers 100m Freestyle M 2 BEL 47.80 2.09 Belgium
5 CAN Canada 1 1 0 Nathan Adrian 100m Freestyle M 3 USA 47.85 2.09 United States
6 CHN China 1 0 0 Penny Oleksiak 100m Freestyle F 1 CAN 52.70 1.90 Canada
7 GBR Great Britain 1 0 0 Simone Manuel 100m Freestyle F 2 USA 52.71 1.90 United States
8 RSA South Africa 0 2 0 Sarah Sjostrom 100m Freestyle F 3 SWE 52.99 1.89 Sweden
9 SWE Sweden 1 1 1 Adam Peaty 100m Breaststroke M 1 GBR 57.13 1.75 Great Britain
10 USA United States 1 1 4 Cameron Van der Burgh 100m Breaststroke M 2 RSA 58.69 1.70 South Africa
11 Codey Miller 100m Breaststroke M 3 USA 58.87 1.70 United States
12 Sarah Sjostrom 100m Butterfly F 1 SWE 55.48 1.80 Sweden
13 Penny Oleksiak 100m Butterfly F 2 CAN 56.46 1.77 Canada
14 Dana Vollmer 100m Butterfly F 3 USA 56.63 1.77 United States
15 Yang Sun 200m Freestyle M 1 CHN 104.65 1.91 China
16 Chad Le Clos 200m Freestyle M 2 RSA 105.20 1.90 South Africa
17 Conor Dwyer 200m Freestyle M 3 USA 105.23 1.90 United States
18 Katie Ledecky 200m Freestyle F 1 USA 113.73 1.76 United States
19 Sarah Sjostrom 200m Freestyle F 2 SWE 114.08 1.75 Sweden
20 Emma McKeon 200m Freestyle F 3 AUS 114.92 1.74 Australia

(a) Write down the formula which should go in cell D3 to calculate the number of gold medals
that Australia won in the events. The formula should be easily replicable to show the number
of gold medals won by the other countries.

The formula should work even if the swimmer details are changed.

= .......................................................................................................................................... [6]

You can use the space below for any working you need.

© UCLES 2019 9626/13/O/N/19 [Turn over


12

(b) The average speed of each swimmer is calculated by dividing the distance swum by the time
taken in seconds.

Write down the formula which should go in cell P3 to calculate Kyle Chalmers’ speed. The
formula should be easily replicable to show the speeds of the other swimmers.

= .......................................................................................................................................... [5]

You can use the space below for any working you need.

(c) Explain how you would amend the spreadsheet so that the cells between M3 to M20 could
only accept the country codes listed. If any other code was input an error message informing
the user an error had occurred would be output.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/13/O/N/19


13

(d) Explain how you would sort the data so that all the female swimmers were grouped together
before the male swimmers and with the furthest distance at the top.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/13/O/N/19 [Turn over


14

12 The principal of a college wishes to keep records of all his students’ details including exam scores.
He is not sure whether he should use a spreadsheet or a database to do this.

Evaluate the use of databases and spreadsheets for such a task.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/13/O/N/19


15

BLANK PAGE

© UCLES 2019 9626/13/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/13/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 5 6 2 1 0 7 0 7 5 2 *

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 5 blank pages.

DC (KN) 188711
© UCLES 2019 [Turn over
2

1 An online retailer sells his goods through his website. He has used e-business software to create
an online store.

(a) Describe the purpose of a shopping cart within the software.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Apart from the shopping cart, describe, including their use, the software or software modules
that the retailer used to set up the online store.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 9626/31/O/N/19


3

2 (a) Describe three different networking protocols that would be used for data transfer on a LAN.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

A company has devices that use WiFi to connect to its LAN.

(b) Describe how data is transmitted between a device and a wireless access point.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/31/O/N/19 [Turn over


4

(c) Some of the company’s devices can connect to other devices using Bluetooth instead of
WiFi.

Compare and contrast the use of Bluetooth with WiFi for data transfer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

3 Analyse the difference between alpha testing and beta testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [3]

© UCLES 2019 9626/31/O/N/19


5

4 Evaluate the use of questionnaires in comparison to interviews and observation when collecting
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/31/O/N/19 [Turn over


6

5 A software company has employed a team of programmers to create a new computer game.
The project must be completed within four weeks. The team will work five days each week. The
programming team have divided the project into eight activities. Some activities can be carried out
at the same time while others have to wait until the preceding activity or activities are completed.

The activities are shown in the table.

Activity code Preceding activity which Time that activity will


must be completed take (days)
A None 4
B None 6
C A 5
D B 5
E D 3
F C 3
G D, F 3
H F 7

© UCLES 2019 9626/31/O/N/19


7

(a) Complete the chart below to create a Gantt chart from the table.

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H

Use the following chart for any working out you need. Please note, any work in this grid will NOT be
marked.

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H
[10]

(b) Identify the activities which form the critical path and give the length of this path.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/31/O/N/19 [Turn over


8

6 Discuss the benefits and drawbacks of using ethernet cables containing copper within a computer
network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/31/O/N/19


9

7 (a) Describe the benefits of using back-ups to prevent loss of data from computer systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe the drawbacks of using back-ups to prevent loss of data from computer systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/31/O/N/19 [Turn over


10

8 A school uses a proxy server to distribute web pages to work stations.

Describe the role of this proxy server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/O/N/19


11

BLANK PAGE

© UCLES 2019 9626/31/O/N/19 [Turn over


12

9 A company has two sites, A and B. Its staff work in either of the two sites and can access their files
offsite because the company uses cloud computing technology for storing files.
The connections at the locations marked X provide security for the company’s data.

Site A Company private network


Cloud storage
X provider
Internet using public
communications
network
Desktop PCs
X
X
Cloud storage
provider

Wireless
Access Points
D Hotel C
Mobile use of X rooms
laptops and
smartphones Internet
cafe
Wireless
Access Points
Wireless
Access Points
Site B Company private network
Wireless
Access Points
Mobile use of
smartphones
and laptops

(a) Explain the role of the hardware and software that would be at locations marked as X.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2019 9626/31/O/N/19


13

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Explain why staff are discouraged from accessing their files from locations C and D.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/31/O/N/19 [Turn over


14

10 A new photograph of a person in her office is required but the person is not available for the photo
shoot.

Fig. 10.1 Fig. 10.2

Explain how the image of the person in Fig. 10.1 was extracted and placed in Fig. 10.2.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/O/N/19


15

BLANK PAGE

© UCLES 2019 9626/31/O/N/19 [Turn over


16

11 The area of a rectangle can be calculated using the JavaScript embedded in a web page as
shown below.

1 <html>
2 <body>
3 <script>
4 var length = parseFloat(prompt("Enter length of the rectangle : "));
5 var width = parseFloat(prompt("Enter width of the rectangle : "));
6
7 var calc_area = (length * width);
8
9 document.write("<br>");
10 document.write("<h3> Area of a rectangle</h3>");
11 document.write("<font face='arial' size='3'>")
12 document.write(" The sides of the rectangle are " + length + " by " +
width + ".</font><br>");
13 document.write("<font face='arial' size='3'>")
14 document.write(" The area of the rectangle is " + calc_area +
".</font><br>");
15
16 </script>
17 </body>
18 </html>
19

© UCLES 2019 9626/31/O/N/19


17

Explain, with reference to the code shown, how the JavaScript collects the dimensions of the
rectangle, calculates the area and displays the area on-screen.

The lines of the code are numbered only for your convenience when referring to the code.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/31/O/N/19


18

BLANK PAGE

© UCLES 2019 9626/31/O/N/19


19

BLANK PAGE

© UCLES 2019 9626/31/O/N/19


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/31/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 9 4 3 3 6 1 9 9 0 3 *

INFORMATION TECHNOLOGY 9626/32


Paper 3 Advanced Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed to be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 17 printed pages and 3 blank pages.

DC (PQ/CB) 175866/3
© UCLES 2019 [Turn over
2

1 Vector images use ‘nodes’.

(a) Describe what is meant by a ‘node’ in a vector image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Describe how node editing can be used to change a vector image.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/32/O/N/19


3

2 A director of a building company is overseeing a large number of projects that are managed using
project management software.

• The director oversees several project managers


• The director reports to the managing director
• The director’s report will include several graphs and tables
• The director and managers work from their offices
• Each manager oversees a team of project supervisors
• Project supervisors will supervise one or more projects and may share projects
• Supervisors can work from home as well as when they are visiting the building sites.

Describe, with reasons, the most appropriate type of project management software that each of
the mentioned personnel could use to manage the projects.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/32/O/N/19 [Turn over


4

3 JavaScript uses strings to store data.

This script is intended to display the contents of three variables on a web page.

Line numbers are provided only for your convenience when referring to the code.

1 <html>
2 <body>
3
4 <p id="names"> </p>
5 <script>
6 var statementtxt1 = "It's only me, 'Hardeep'";
7 var statementtxt2 = "His name is "Peter"";
8 var statementtxt3 = "We call her Jasmine";
9 document.getElementById( 'names' ).innerHTML = statementtxt1 + "<br>"
+ statementtxt2 + "<br>" + statementtxt3;
10 </script>
11 </body>
12 </html>

Explain, giving reasons, why no output is produced when this JavaScript is executed by a web
browser as part of a web page.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [3]

© UCLES 2019 9626/32/O/N/19


5

BLANK PAGE

© UCLES 2019 9626/32/O/N/19 [Turn over


6

4 A web page uses JavaScript code to display a list of food crops.

Line numbers are provided only for your convenience when referring to the code.

1 <html>
2 <body>
3 <p id="foodcrops"></p>
4 <script>
5 var crops = ["corn", "rice", "maize", "sugarcane"];
6 var i = 0;
7 var show = "";
8 while (crops[i]) {
9 show += crops[i] + "<br>";
10 i++;
11 }
12 document.getElementById("foodcrops").innerHTML = show;
13 </script>
14 </body>
15 </html>

(a) Explain, in detail, how the JavaScript code produces this list from an array.

corn
rice
maize
sugarcane

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
© UCLES 2019 9626/32/O/N/19
7

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Explain how you would amend the existing JavaScript code to add ‘beans’ to the array so that
it would produce this list.

beans
corn
rice
maize
sugarcane

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/32/O/N/19 [Turn over


8

5 Discuss the impact on students of their use of smartphones.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/O/N/19


9

6 Describe the benefits of using lasers to transmit data between devices.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/32/O/N/19 [Turn over


10

7 Robotic delivery systems are being used by organisations to deliver goods direct to customers.

Evaluate the use of robotics in the delivery of goods.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/O/N/19


11

8 A bank stores details of customer accounts on its computer system. Customers and staff can
access the accounts by logging in to the bank’s website.

(a) Describe the security methods that could be used to ensure that the person logging in is
authorised to do so.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 9626/32/O/N/19 [Turn over


12

(b) The bank insists that its staff use a VPN when accessing the accounts from outside the bank’s
intranet.

Describe the network protocols that could be used by this VPN.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 9626/32/O/N/19


13

9 Compare and contrast the use of a Massive Open Online Course (MOOC) with the use of online
tutorials.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

10 Describe the effect of bit rate on the quality of streamed video.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/32/O/N/19 [Turn over


14

11 Fig. 11.1 shows a photograph of a scene. Fig. 11.2 shows the same scene after the photograph
has been edited with image editing software.

Fig. 11.1 Fig. 11.2

Describe how image editing tools could have been used to change the photograph in Fig. 11.1 into
that in Fig. 11.2.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

© UCLES 2019 9626/32/O/N/19


15

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/32/O/N/19 [Turn over


16

12 A new app has been created for smartphones, but is unreliable due to some unknown coding
errors.

A group of testers has been asked to locate the errors and suggest, in a report, corrections that
should be made to the code before the app is ready for sale. The testers have been given a list of
milestones to record their progress. These are shown:

Milestones to be reached:
1 Check that the plan will solve the unreliability issue.
2 Create a plan to correct the code.
3 Create a theory as to which lines/areas/blocks/sections of code are causing the unreliability.
4 Document the results of the testing in a report.
5 Download and install app on the smartphone.
6 Identify the problem with the code by running the app.
7 Suggest corrections that could correct the unreliability.
8 Test the suggested corrections.
9 Test the theory to see if the unreliability can be replicated elsewhere.

List, by writing the number of the milestone, the order in which these milestones should be reached
by the testers.

.............................

.............................

.............................

.............................

.............................

.............................

.............................

.............................

............................. [5]

© UCLES 2019 9626/32/O/N/19


17

13 Computer Aided Design software has been used to create a design for a new kitchen as shown:

Plan Image 1 Image 2

Describe how the software tools would have been used to create the plan and the images from it.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/32/O/N/19 [Turn over


18

14 Evaluate the impact of holographic imaging on medicine.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/32/O/N/19


19

BLANK PAGE

© UCLES 2019 9626/32/O/N/19


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/32/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 9 0 3 5 0 6 3 8 8 *

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators must not be used on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 5 blank pages.

DC (JP/CB) 176306/3
© UCLES 2019 [Turn over
2

1 An online retailer sells his goods through his website. He has used e-business software to create
an online store.

(a) Describe the purpose of a shopping cart within the software.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

(b) Apart from the shopping cart, describe, including their use, the software or software modules
that the retailer used to set up the online store.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

© UCLES 2019 9626/33/O/N/19


3

2 (a) Describe three different networking protocols that would be used for data transfer on a LAN.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

A company has devices that use WiFi to connect to its LAN.

(b) Describe how data is transmitted between a device and a wireless access point.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/33/O/N/19 [Turn over


4

(c) Some of the company’s devices can connect to other devices using Bluetooth instead of
WiFi.

Compare and contrast the use of Bluetooth with WiFi for data transfer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

3 Analyse the difference between alpha testing and beta testing.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [3]

© UCLES 2019 9626/33/O/N/19


5

4 Evaluate the use of questionnaires in comparison to interviews and observation when collecting
data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/33/O/N/19 [Turn over


6

5 A software company has employed a team of programmers to create a new computer game.
The project must be completed within four weeks. The team will work five days each week. The
programming team have divided the project into eight activities. Some activities can be carried out
at the same time while others have to wait until the preceding activity or activities are completed.

The activities are shown in the table.

Activity code Preceding activity which Time that activity will


must be completed take (days)
A None 4
B None 6
C A 5
D B 5
E D 3
F C 3
G D, F 3
H F 7

© UCLES 2019 9626/33/O/N/19


7

(a) Complete the chart below to create a Gantt chart from the table.

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H

Use the following chart for any working out you need. Please note, any work in this grid will NOT be
marked.

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H
[10]

(b) Identify the activities which form the critical path and give the length of this path.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [2]

© UCLES 2019 9626/33/O/N/19 [Turn over


8

6 Discuss the benefits and drawbacks of using ethernet cables containing copper within a computer
network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/33/O/N/19


9

7 (a) Describe the benefits of using back-ups to prevent loss of data from computer systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe the drawbacks of using back-ups to prevent loss of data from computer systems.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/33/O/N/19 [Turn over


10

8 A school uses a proxy server to distribute web pages to work stations.

Describe the role of this proxy server.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/O/N/19


11

BLANK PAGE

© UCLES 2019 9626/33/O/N/19 [Turn over


12

9 A company has two sites, A and B. Its staff work in either of the two sites and can access their files
offsite because the company uses cloud computing technology for storing files.
The connections at the locations marked X provide security for the company’s data.

Site A Company private network


Cloud storage
X provider
Internet using public
communications
network
Desktop PCs
X
X
Cloud storage
provider

Wireless
Access Points
D Hotel C
Mobile use of X rooms
laptops and
smartphones Internet
cafe
Wireless
Access Points
Wireless
Access Points
Site B Company private network
Wireless
Access Points
Mobile use of
smartphones
and laptops

(a) Explain the role of the hardware and software that would be at locations marked as X.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

© UCLES 2019 9626/33/O/N/19


13

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [8]

(b) Explain why staff are discouraged from accessing their files from locations C and D.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/33/O/N/19 [Turn over


14

10 A new photograph of a person in her office is required but the person is not available for the photo
shoot.

Fig. 10.1 Fig. 10.2

Explain how the image of the person in Fig. 10.1 was extracted and placed in Fig. 10.2.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/O/N/19


15

BLANK PAGE

© UCLES 2019 9626/33/O/N/19 [Turn over


16

11 The area of a rectangle can be calculated using the JavaScript embedded in a web page as
shown below.

1 <html>
2 <body>
3 <script>
4 var length = parseFloat(prompt("Enter length of the rectangle : "));
5 var width = parseFloat(prompt("Enter width of the rectangle : "));
6
7 var calc_area = (length * width);
8
9 document.write("<br>");
10 document.write("<h3> Area of a rectangle</h3>");
11 document.write("<font face='arial' size='3'>")
12 document.write(" The sides of the rectangle are " + length + " by " +
width + ".</font><br>");
13 document.write("<font face='arial' size='3'>")
14 document.write(" The area of the rectangle is " + calc_area +
".</font><br>");
15
16 </script>
17 </body>
18 </html>
19

© UCLES 2019 9626/33/O/N/19


17

Explain, with reference to the code shown, how the JavaScript collects the dimensions of the
rectangle, calculates the area and displays the area on-screen.

The lines of the code are numbered only for your convenience when referring to the code.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/33/O/N/19


18

BLANK PAGE

© UCLES 2019 9626/33/O/N/19


19

BLANK PAGE

© UCLES 2019 9626/33/O/N/19


20

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/33/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 4 5 3 6 6 6 4 7 7 4 *

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 14 printed pages and 2 blank pages.

DC (PQ) 183622
© UCLES 2019 [Turn over
2

1 Tick the four most accurate statements regarding the benefits of gathering data from direct data
sources.

You only have to gather as much or as little data as you need


It allows data to be gathered from subjects to which the data gatherer does not have
physical access
You can obtain the data faster than using an indirect data source

You have full control over the method used to collect the data

A much larger sample size can be used than is possible with indirect data sources

A direct data source is quicker to search

There may be an opportunity to sell the data to other people for them to use

You do not have to spend time interviewing people or giving out questionnaires

A CD ROM of historical data is a direct data source

The source of the data is known exactly, making it easier to judge its reliability
[4]

2 Tick the four most accurate statements regarding the gathering of personal data by unauthorised
persons.

Pharming involves sending a website URL, inviting the receiver to go to the website
Smishing involves using text messages to persuade people to give out personal
information
Phishing involves installing malicious software on the victim’s computer

Pharming involves creating a fake website that looks like an actual bank’s website

Phishing involves the sending of fake emails in order to advertise the bank
Vishing involves the fraudster’s computer redirecting a customer’s phone call to his
own phone
Banks can ask you from time to time to send them your full password to check you
are authorised to use that account
Vishing involves receiving a phone call from a fraudster

Vishing never involves getting the customer to phone the bank

Smishing is the same as vishing but never involves the use of a phone
[4]

© UCLES 2019 9626/11/O/N/19


3

3 Most computer systems consist of hardware and software.

(a) Define the term ‘hardware’ in an IT context.

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Giving brief descriptions of two examples, define the term utility software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

4 Using a news website as an example, describe what is meant by dynamic data.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/11/O/N/19 [Turn over


4

5 When creating queries, a function IIf() is often used. A table containing a list of where people live
and their status could exist so that a query could be constructed:

IIf([Living_in]=“own home”,“own”,“other”)

This would look in a list of where people lived for the words ‘own home’ and would output the word
‘own’ if a match were found. If it was not ‘own home’ then the word ‘other’ is output.

(a) Complete the nested query that would be used to output ‘rented’ for anyone living in
accommodation owned by a landlord. This is indicated by the word ‘landlord’ in the Living_in
field (see table on page 5).

IIf([Living_in]=“own home”,“own” ..............................................................................................

............................................................................................................................................. [6]

You can use the space below for any working you need.

© UCLES 2019 9626/11/O/N/19


5

(b) Below is shown the output created from a larger database.

Describe the steps required to produce this output (from the query in part (a)), without using a
wizard.

Second_Name Name1 Living_in Status


Burke Dougie own home own
Charles David with parents other
Hoy Tony landlord rented
Lee Duncan own home own
Macdonald Lotte with friends other
Norfolk Jeannie landlord rented
Reid Laura own home own
Rydell Jenna own home own
Ryder Joe with parents other
Thomson Jimmy landlord rented

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/11/O/N/19 [Turn over


6

6 John, a user interface designer, has been asked by a systems analyst to design an interface for a
proposed information system. He will need to consider a mental model of the potential users of the
system.

(a) Describe what is meant by a mental model in this context.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) Describe the features of a user interface which need to be considered when planning its
design. Where appropriate, give examples of each feature.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]

© UCLES 2019 9626/11/O/N/19


7

7 A hospital has installed video-conferencing equipment so that senior doctors in the hospital can
stay in touch with other doctors who work in areas away from the hospital.

Evaluate the impact of video-conferencing on both groups of doctors.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/11/O/N/19 [Turn over


8

8 Roger has decided to set up a mail order company. He needs to create a database of customer
records and orders. He is not sure whether to create a flat file database or a relational database.

Explain the differences between a flat file database and a relational database.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/11/O/N/19


9

9 Computer networks can often be classified as consisting of two types, peer-to-peer and client-
server networks.

Describe a peer-to-peer network.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [5]

© UCLES 2019 9626/11/O/N/19 [Turn over


10

10 Expert systems often use a mixture of forward chaining and backward chaining to determine the
probable solution to a problem.

Describe the terms:

(a) Forward chaining.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Backward chaining.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/11/O/N/19


11

11 Here is a spreadsheet showing the medal winners at some of the 2016 Olympics swimming
events.

A B C D E F G H I J K L M N O P Q
Average
Code of speed
1 Country code Country name Gold Silver Bronze Swimmer Distance Stroke Gender Position country Time (secs) (m/s) Name of country
2
3 AUS Australia 1 0 1 Kyle Chalmers 100m Freestyle M 1 AUS 47.58 2.10 Australia
4 BEL Belgium 0 1 0 Pieter Timmers 100m Freestyle M 2 BEL 47.80 2.09 Belgium
5 CAN Canada 1 1 0 Nathan Adrian 100m Freestyle M 3 USA 47.85 2.09 United States
6 CHN China 1 0 0 Penny Oleksiak 100m Freestyle F 1 CAN 52.70 1.90 Canada
7 GBR Great Britain 1 0 0 Simone Manuel 100m Freestyle F 2 USA 52.71 1.90 United States
8 RSA South Africa 0 2 0 Sarah Sjostrom 100m Freestyle F 3 SWE 52.99 1.89 Sweden
9 SWE Sweden 1 1 1 Adam Peaty 100m Breaststroke M 1 GBR 57.13 1.75 Great Britain
10 USA United States 1 1 4 Cameron Van der Burgh 100m Breaststroke M 2 RSA 58.69 1.70 South Africa
11 Codey Miller 100m Breaststroke M 3 USA 58.87 1.70 United States
12 Sarah Sjostrom 100m Butterfly F 1 SWE 55.48 1.80 Sweden
13 Penny Oleksiak 100m Butterfly F 2 CAN 56.46 1.77 Canada
14 Dana Vollmer 100m Butterfly F 3 USA 56.63 1.77 United States
15 Yang Sun 200m Freestyle M 1 CHN 104.65 1.91 China
16 Chad Le Clos 200m Freestyle M 2 RSA 105.20 1.90 South Africa
17 Conor Dwyer 200m Freestyle M 3 USA 105.23 1.90 United States
18 Katie Ledecky 200m Freestyle F 1 USA 113.73 1.76 United States
19 Sarah Sjostrom 200m Freestyle F 2 SWE 114.08 1.75 Sweden
20 Emma McKeon 200m Freestyle F 3 AUS 114.92 1.74 Australia

(a) Write down the formula which should go in cell D3 to calculate the number of gold medals
that Australia won in the events. The formula should be easily replicable to show the number
of gold medals won by the other countries.

The formula should work even if the swimmer details are changed.

= .......................................................................................................................................... [6]

You can use the space below for any working you need.

© UCLES 2019 9626/11/O/N/19 [Turn over


12

(b) The average speed of each swimmer is calculated by dividing the distance swum by the time
taken in seconds.

Write down the formula which should go in cell P3 to calculate Kyle Chalmers’ speed. The
formula should be easily replicable to show the speeds of the other swimmers.

= .......................................................................................................................................... [5]

You can use the space below for any working you need.

(c) Explain how you would amend the spreadsheet so that the cells between M3 to M20 could
only accept the country codes listed. If any other code was input an error message informing
the user an error had occurred would be output.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/11/O/N/19


13

(d) Explain how you would sort the data so that all the female swimmers were grouped together
before the male swimmers and with the furthest distance at the top.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/11/O/N/19 [Turn over


14

12 The principal of a college wishes to keep records of all his students’ details including exam scores.
He is not sure whether he should use a spreadsheet or a database to do this.

Evaluate the use of databases and spreadsheets for such a task.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/11/O/N/19


15

BLANK PAGE

© UCLES 2019 9626/11/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/11/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level
* 6 1 3 8 0 5 4 0 7 4 *

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2019
1 hour 45 minutes
Candidates answer on the Question Paper.
No Additional Materials are required.

READ THESE INSTRUCTIONS FIRST

Write your centre number, candidate number and name in the spaces at the top of this page.
Write in dark blue or black pen.
You may use an HB pencil for any diagrams, graphs or rough working.
Do not use staples, paper clips, glue or correction fluid.
DO NOT WRITE IN ANY BARCODES.

Answer all questions.

Calculators are not allowed on this paper.

At the end of the examination, fasten all your work securely together.
The number of marks is given in brackets [ ] at the end of each question or part question.

Any businesses described in this paper are entirely fictitious.

This document consists of 15 printed pages and 1 blank page.

DC (JP/FC) 168818/3
© UCLES 2019 [Turn over
2

1 Tick the four most accurate statements regarding gathering data from indirect data sources.

It may involve having to purchase more data loggers

Several people would have to be employed to carry out interviews

It always takes longer to gather data from an indirect data source

It is impossible to ensure that data was collected from a representative sample

The data may be out of date

The sample size is always smaller than if you used a direct data source

The purpose for which data was collected originally may be quite different from the
purpose of the current research
There may be no data available. The data required has simply never been recorded

The coding used in the data is never explained

Compared to direct data sources, using indirect data sources is always very expensive
when preparing and carrying out the gathering of data
[4]

2 Tick the four most accurate statements regarding internal hardware components.

A motherboard has a collection of chips and controllers known as the chipset

A hard disk drive usually has less storage capacity than the RAM within a computer

ROM is the memory used to store documents the user is currently working on

The hard disk drive is used to store application software

A solid state drive has no moving parts

RAM is memory that cannot be changed

A hard disk drive uses flash memory to store data

RAM stores the start up instructions of a computer even when it is switched off

A PC can still work without having a CPU

The arithmetic logic unit and the control unit are part of the CPU in a computer

[4]

© UCLES 2019 9626/12/O/N/19


3

3 A hockey club secretary is planning to computerise the players’ records. For this system she is
considering using custom written software.

(a) Describe the drawbacks of using custom written software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Describe the benefits of using custom written software.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/12/O/N/19 [Turn over


4

4 Doctors often use expert systems to help them make a diagnosis.

Without describing its components explain how an expert system helps the doctor come to a
decision regarding the diagnosis.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [4]

© UCLES 2019 9626/12/O/N/19


5

5 Here is a spreadsheet showing the top European goal scorers in the 2018 Football World Cup
qualification matches.

(a) Write down the formula which should go in cell H3 to display the name of the country for
Robert Lewandowski. The formula must be easily replicable.

= .......................................................................................................................................... [5]

You can use the space below for any working you need.

© UCLES 2019 9626/12/O/N/19 [Turn over


6

(b) Explain, in detail, the steps you would take to amend the spreadsheet so that the players will
be put in order of the average number of goals scored per games played for each player. The
highest average number should be first in the list.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

© UCLES 2019 9626/12/O/N/19


7

6 Many organisations have an intranet and often extend it to form an extranet.

Describe, using examples, what an intranet is and how it could be extended into an extranet.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/12/O/N/19 [Turn over


8

7 Sadiq has written a program that he now wishes to convert using a compiler.

(a) There are two types of software. Name them, indicating which type a compiler is.

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [1]

(b) Describe the function of a compiler.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

© UCLES 2019 9626/12/O/N/19


9

8 Kelvin was given the task of creating a relational database to combine all his company’s customer
records and sales records (invoices). The tables that were created are shown here.

Customer table

Customer_id Family_name First_name Credit_limit Loyalty_number


M3764A Burke Linda €1,980 408254117150
N3201B Charles Lauren €2,650 545687952356
N5789A Floyd Joe €1,850 803226234709
L2345A Hall John €2,700 678914325678
Q4012A Jones Laura €3,400 384466646362
L3896C Li Kurtis €2,130 846869163975
M4698B Norfolk Kate €1,250 243375720844
M2589D Rhodes Lotte €3,400 385657814001
M4013B Sun Wu Li €2,240 320031330576
P4352D Watson Karla €2,130 322036694448
P3156C Williams Joanne €1,870 421536345681

Invoices table

Invoice_number Number_of_items Item_cost Customer_ref Delivered


32178 8 €12.45 P4352D
43189 6 €17.30 N5789A
45237 4 €38.50 M4698B
45964 1 €152.20 L3896C
46579 3 €38.20 N3201B
56931 5 €17.50 M2589D

You can assume that all values shown include the maximum and minimum allowed in each field.

(a) Complete the data dictionary below for the Invoices table. You can assume that all values
shown are typical. All field sizes should be appropriate.

Attribute Data type Field size Format Type of key

[6]

© UCLES 2019 9626/12/O/N/19 [Turn over


10

(b) Kelvin wishes to add a calculated field showing the total cost for each customer.

Describe the steps he would need to follow in order to create this calculated field using a
query without using a wizard.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [6]

(c) The following data was typed in error. For each item explain how validation could have
prevented the error and explain what would be allowed.

(i) 321789 in the Invoice_number field.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9626/12/O/N/19


11

(ii) 12500 in the Credit_limit field.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iii) L21789 in the Customer_id field.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

(iv) 679814325678 in the Loyalty_number field for John Hall.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]

© UCLES 2019 9626/12/O/N/19 [Turn over


12

9 Evaluate the use of HTTPS in websites.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/12/O/N/19


13

10 Many organisations make use of Management Information Systems (MIS). Explain what a typical
MIS consists of, including the role of an MIS manager.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [6]

© UCLES 2019 9626/12/O/N/19 [Turn over


14

11 Juanita, an office manager, has just been given the task of producing customer invoices. Each
invoice will need to have three copies. She is trying to decide between using a dot matrix printer or
an inkjet printer to produce the invoices.

(a) Give three detailed advantages of Juanita choosing a dot matrix printer.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

(b) Give three detailed disadvantages of Juanita choosing a dot matrix printer.

1 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

2 ................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

3 ................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [3]

© UCLES 2019 9626/12/O/N/19


15

12 Laura, the manager of a new company, has just purchased some computers for workers to use.
With the increase in the use of ransomware by hackers she has decided that the workers will not
be allowed access to the internet. However, she needs to decide whether or not to connect the
computers together to form a network.

Without referring to the internet, discuss the advantages and disadvantages of networking these
computers.

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

..........................................................................................................................................................

.................................................................................................................................................... [8]

© UCLES 2019 9626/12/O/N/19


16

BLANK PAGE

Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of the Cambridge Assessment Group. Cambridge Assessment is the brand name of the University of
Cambridge Local Examinations Syndicate (UCLES), which itself is a department of the University of Cambridge.

© UCLES 2019 9626/12/O/N/19


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/31


Paper 3 Advanced Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a) Accumulates goods ready for purchase 2


Calculates total cost of purchases for user to approve/check.

1(b) Eight from: 8

Web server software to host the store


Database to store information about items being sold
Interface for staff to update database of items
Search engine to enable customers to search for items
Software to enable customers to create accounts
Security software to check log in details
Security software to authenticate bank details
Firewalls to help prevent hacking
Backup software to make backups of the database and website
Store front view to show customers details of items/products
Administration section to allow merchant to manage the online shop
... by editing/adding products
... by editing/amending prices
... by managing discounts
... by managing shipping costs
Allow appearance/skin to be changed to match shop web site
Allow a guest account so customer does not need to create a personal
account
Allow customer to ship to multiple addresses
Provide suggestions for further purchases
Allow products to be saved for future use/re-ordering/provide ‘wish lists’
Provide for return of goods
Provide system for customer loyalty reward
Database of customer records/details
System for online chat/help
System for FAQs to be shown.

Question Answer Marks

2(a) Three protocols from e.g.: 3

FTP/file transfer protocol for uploading data/files/pages to server


HTTP/hypertext transfer protocol for accessing web pages
HTTPS/hypertext transfer protocol secure for secure data transfer
SMTP/IMAP/POP to send/receive emails
TCP/IP for packet transmission
SSH for secure access to a server/another workstation
SFTP for secure method of uploading data to a server
SMB for transferring files to a file server
TELNET to connect computers to a switch/router.

© UCLES 2019 Page 3 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(b) Four from: 4

Uses radio waves in 2.4 GHz/5 Ghz frequency ranges/(900 MHz and
3.6/60 GHz frequency bands)
Data frames are modulated onto carrier wave
Spread spectrum used for higher power levels
Two channels used for full duplex exchange of data/most WiFi is half-duplex
WiFi network uses SSID to identify itself
Access point and device must be connected to same WiFi network/SSID to be
able to exchange data
Data is encrypted for security during transmission
Devices must use IEEE 802.11 protocols/standards
IEEE 802.11 has a number of variants a/b/g/n/ac(/ad/ah/aj/ax/ay/az) (must
have 3 to gain this extra mark)
14 channels on 2.4 GHz which are 5 MHz spaced/device uses channels
spaced apart to reduce channel interference.

2(c) Candidates may refer to e.g.: 6

Two similarities from:

They are both communication systems


Both use wireless technology
Both have more limited range than cabled networks
Both have limited bandwidth compared to cable networks

Four differences from:

Bluetooth has a shorter range than WiFi


Bluetooth is restricted by solid objects/barriers/walls whereas WiFi can
penetrate most barriers to some extent
Bluetooth has a lower bandwidth than WiFi
Bluetooth requires ‘pairing’ of devices whereas WiFi (often/usually) requires a
full log in procedure
Bluetooth data transfer is ‘one to one’ whereas WiFi facilitates communication
between several devices.

© UCLES 2019 Page 4 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3 Three from: 3

Max One from:

Alpha testing is carried out by the developers whereas beta testing is carried
out by users
Alpha testing includes both black box testing and white box testing
Alpha Testing is carried out before the launch of software product into the
market
Beta testing is always a black box testing or a functional testing
Beta Testing is done at the time of software product marketing

Max Three from:

Beta testing reduces product failure risks


Beta testing audiences give a more objective view than employees carrying
out alpha testing
Beta testing is carried out on a nearly complete system whereas alpha testing
will encounter far more bugs.
Alpha testers will provide a more technical analysis of the faults of the system.

© UCLES 2019 Page 5 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.

Eight from:

Advantages:

Large amounts of information may be gathered from many responders in a


shorter time than interviewing
Unlike with questionnaires, interviewees might try and provide answers which
they think the interviewer wants to hear
Can be carried out by any number of researchers with little effect on the
reliability and validity of the data
Easier to analyse quantitatively than interviews

Disadvantages:

Cannot see the process as a whole as you would with observation


Cannot move away from their ‘script’ and ask a more in-depth question as
they could with interviews
Cannot interpret body language as would be possible with
observation/interviews
Do not have to arrange a set time as would be required for interviews
Questionnaires can lead to people not telling the truth as they are
anonymous, which is less likely with interviews
Questions cannot be changed once they are typed up unlike interviews
Follow up questions cannot be asked unlike interviews
More difficult to interpret emotions/feelings on a subject
Cannot determine how much thought/consideration has been given to the
answers by respondents
Cannot have questions explained as to their purpose/meaning unlike
interviews.

© UCLES 2019 Page 6 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(a) Ten from: 10

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity
code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H

(Critical path is white and shown for part (b))

Marks allocated as follows:

Correct positioning of activities A and B on Week 1 Day 1


Correct length of activity B at Week 1 Day 1 to Week 2 Day 1 (6 working
days)
Correct positioning of activity C after activity A
Correct length of activity C at Week 1 day 5 to Week 2 day 4 (5 working days)
Correct positioning of activity D after activity B
Correct length of activity D at Week 2 day 2 to Week 3 day 1 (5 working days)
Correct positioning of activity E after activity D
Correct length of activity E at 3 days (Week 3 day 2 to Week 3 day 4)
Correct positioning of activity F after activity C
Correct length of activity F at 3 days
Correct positioning of activity G after activity F (D has already ended)
Correct length of activity G at 3 days
Correct positioning of activity H after activity F
Correct length of activity H at 7 days (Week 3 day 3 to week 4 day 4).

5(b) Activities A, C, F and H – 1 mark 2


Length is 19 days – 1 mark

© UCLES 2019 Page 7 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)

Candidates will evaluate in detail the benefits and drawbacks of the use of
copper cables
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain the benefits and drawbacks of the use of copper
cables
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)

Candidates will describe at least one benefit and at least one drawback of the
use of copper cables
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may include reference to:

Benefits:

Flexible so can be installed almost anywhere/can use ‘tight’ bends


Can run electrical power along copper cable/Ethernet cable
Can supply power to remote devices e.g. cameras high on buildings do not
need separate power supply
Costs of installation are less than for fibre optic cables
NICs that use copper connections are cheaper to buy than those that use e.g.
fibre optic
Can provide higher bandwidths than wireless/WiFi
Harder to hack into compared to WiFi

Drawbacks:

Can be subject to electrical interference


Must not be run next to mains power cables
Costs of installation are more than for wireless/WiFi
Cannot provide as high bandwidths as fibre optic

© UCLES 2019 Page 8 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6 Break/lose contact/connection more frequently than fibre optic cables


Easier to connect into by unauthorised users
More of a safety/tripping hazard than WiFi.

Question Answer Marks

7(a) Three from: 3

Rapid access to (lost/removed) data/files


Protection of data/files against power loss/failure of main system
Protects against failure of storage system/hard disk
Protects against loss of data from viruses/malware
Protects against failure of OS.

7(b) Three from: 3

Backups will store malware as well as safe data


Backups will not remove malware
Backups will restore data to time before malware infection but latest data will
be lost
Backups may not store up to date data if run during office/use hours
Backups take snapshot of data which may change soon after backup is run so
some data may not be backed up
Backups can be stolen in their entirety
If not encrypted all data can be stolen/accessed
Backup windows should use system downtime which may be limited to out of
hours’ time
System performance is reduced when backups are being carried out
Restoration of data after malware infection can be laborious and time
consuming
Cost of extra hardware/storage may be excessive.

Question Answer Marks

8 Six from: 6

Acts as gateway between LAN and WAN/internet


Allows use of multiple (internal) IP addresses through one (external) IP
address on internet
Many computing devices/computers can be used through one internet
connection
Presents single IP address to exterior networks/internet (as number of
external IP addresses is limited)
Acts as a central device/node for logging/monitoring of internet access/activity
Acts as a central device/node for filtering of internet access/activity
Controls/requires username and password for internet access/activity
Prevents access to inappropriate material/activities
Acts as a cache for frequently used remote resources
Reduces access times/network traffic over internet connection.

© UCLES 2019 Page 9 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9(a) Eight from: 8

Anti-malware/virus/spyware software to protect against viruses and spyware.

Firewall (software or hardware) to help to prevent unauthorised access to


company network
Firewall to help to prevent unauthorised access to files stored by cloud
storage provider
Only allow access to company devices/laptops/smartphones
Firewall to enforce company security polices
Firewall to interrogate data packets entering/leaving company networks/cloud
storage providers
Firewall works by comparing contents of packets with predetermined/user
defined rules

Router to direct data packets to/from internet from/to company network/Cloud


storage provider
Router maintains database/list/table of IP addresses to forward packets
Router updates list from other routers as addresses become known to it
Router ranks entries in table according to probability of being correct address
for packet to take on its route to destination
Router maintains list/table of other routers to send packet if route is unknown.

X should use encryption to secure the data for transmission


Passwords and user IDs should be required by the access/firewall software
before allowing devices to connect/access.

For 8 marks, must have at least 1 mark from each of firewall, router and
encryption.

9(b) Four from: 4

Locations B and C are open to the public/any device can connect so there is
no secure connection at these locations
Data may not be encrypted
Location B could be used by hackers using Man in Middle (MIM) to route data
through hacker computer
Location B may be susceptible to fake/spoof/unauthorised wireless access
points/connections
Location B may be susceptible to intercepting wireless signals from company
devices as there is no check on users of cafes/can sit anywhere without
reason/identification.

© UCLES 2019 Page 10 of 11


9626/31 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

10 Six from: 6

Photographs opened in image editor


Person image cut out from photograph 1/Fig. 10.1
Mask around person is created to cover background
Selection to be cut is highlighted/drawn
Selection is modified around edges to ensure accuracy
Using of adjustable nib for drawing tool
Cut unwanted parts of image of woman
Background of cut image changed to transparent
Copy cut out (to clipboard)
Create new layer for image of woman
Import/paste cut out into image of office/photograph of office/Fig. 10.2
Place new image in correct position
Resize image of woman (as required to fit in image of office)
Bring to front/back as necessary
Flatten/merge layers (if required)
Correct new image for overlap/misplaced parts/pixels of imported image
Crop area of new image/photograph 2 as required.

Question Answer Marks

11 Six from: 6

Line 4 declares the variable/var length to hold one side of rectangle


Line 5 declares the variable/var width to hold other side of rectangle
parseFloat (prompt(“”)); used to display message
parseFloat (prompt(“”)); used to collect values for both sides of rectangle
parseFloat (prompt(“”)); used to create a (text) box for the user to enter the
values
Variable/var calc_area is declared to calculate the area
Holds result of calculation
document.write() is used to display the messages on screen about the
values/area of the rectangle
Displays the results of the calculation/contents of var calc_area.

© UCLES 2019 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/32


Paper 32 Advanced Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a) Two from: 2

Control point for lines/paths in image


Has defined positions on the x- and y- axes
Determines direction/vector of path
Defines/shows the start and end points of lines/arcs/paths.

1(b) Four from: 4

(Unrelated) nodes can be joined together


Nodes can be moved to change the shape/path direction
Add a new node(s) to change overall shape/add new path
Delete a node to change overall shape/delete path
Use of symmetrical nodes to create smooth, flowing curves on either side of a
node.
Use of asymmetrical nodes to obtain a different amount of curve on each side
of the node (keeping a smooth flow through the node)
Adjusting the length of each control arm without changing the direction
Use of cusp nodes to create extreme changes in direction
Adjusting the length and direction of each control arm independently
Use of smooth nodes to create smooth transitions between straight/curved
line segments

Question Answer Marks

2 Six from: 6

Director would use desktop PMS because he requires high quality graphics
Managing Director would use desktop PMS because he requires high quality
graphics/only needs to oversee/view final work so only needs to use desktop
Director does not need to share/collaborate with others on amends but just
oversee them so only needs to use desktop
Project managers could use desktop or web-based as based in office
so will probably be using a desktop computer which can also access the
internet
Project managers need to share/collaborate/amend work from supervisors
and so more likely to use web-based software as not all desktop software
facilitates collaboration
Project supervisors could use web-based PMS as can use remotely
Some supervisors may need to use mobile devices (may not have desktop
software installed but can access the internet) so would need to use web-
based software.

© UCLES 2019 Page 3 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3 Three from: 3

Line 7 contains a syntax error


”Peter” is enclosed in quotes that are the same as the quotes for the string
(Strings in JavaScript can contain quotes but) the quotes in a string must not
be the same as the enclosing quotes
Any syntax error causes the script to fail/not run
No error message is produced.

Question Answer Marks

4(a) Eight from: 8

Code is embedded in HTML code of the website by <script> and </script>


delimiters/markers
The browser executes the JavaScript code within the delimiters
Variable crops is set to contain the list of crops
Variables i and show are initialised
While loop will continue looping as long as crops[i] contains data/string
(var) i is incremented by 1 each time loop is executed
(var) show is set to the current value of show concatenated with next crop
value
Loop terminates when array has no more items/final value in array is reached
Final values of (var) show are displayed on screen/web page
Values shown in vertical list as <br> code forces carriage return/line feed.

4(b) Two from: 2

Amend the array var crops = [] 1 mark


to [“beans”, "corn", "rice", "maize", "sugarcane"]; 1 mark

Add the line


crops.unshift("beans"); 1 mark
any line between var crops and while() 1 mark

Amend the var show line to 1 mark


"beans <br>"; 1 mark

© UCLES 2019 Page 4 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.

Positive impacts include e.g.:

Can search for information related to study using internet anywhere/anytime


Can search for journals/articles/references without having to visit/book time
library/computer room
Can be used to set reminders about due dates/times of submission of
assignments
Helps to avoid using stationery for notes/can dictate/write notes for later
reference (during lectures)
Use of device to coordinate social activities
Can be used to monitor health of student

Negative impacts include, e.g.:

Use of smartphones during physical exercise can reduce the benefits of the
physical exercise
Can be a source of harm to student well-being e.g. constant use, dependency
on device reduces personal social interaction
Can be a source of distraction from tasks in hand
Can be used to harass other individuals
Can be used to cheat in examinations
Can reduce ability to engage in verbal/face-to-face conversations with others
Can create poor behaviour e.g. intolerance/withdrawal from society/social
life/aggression towards others

Max 6 for all positive or all negative impacts.


1 mark available for a valid, reasoned conclusion.

Question Answer Marks

6 Six from: 6

Can transmit data long distances along thin fibre optic cables
Laser light is coherent so is not easily lost by dispersion
Can carry vast amounts of data/implement very high bandwidths for data
transmission
Can be used in free space/just air so no need for cables
Can be used in a vacuum so can be used between spacecraft
Immune to electromagnetic interference
Increased security as difficult to intercept in fibre/free space
No licence to use is required (for use in free space) in most areas of the world
Can be used to power devices in free space.

© UCLES 2019 Page 5 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)

Candidates will evaluate in detail the advantages and disadvantages of the


use of robotics by delivery companies
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain the advantages and disadvantages of the use of


robotics by delivery companies
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)

Candidates will describe at least one advantage and at least one


disadvantage of the use of robotics by delivery companies
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may make reference to e.g.:

Airborne drones do not need roads


Airborne drones have direct routes to recipients
Airborne drones do not need drivers
Can provide ‘last mile’ delivery options/handle small orders over limited
distances
Can provide assistance for elderly/disabled when collecting items e.g.
prescriptions/groceries
Use of robotic systems for room service in hotels may not be popular with
guests due to use of cameras and recording systems
Requirement for GPS and cameras to enable robotic delivery system to
navigate and negotiate roads/sidewalks
Require PIN code/smartphone access to collect goods
Airborne drones have limited carrying capacity
Airborne drones have limited range
Airborne drones are liable to interception with no immediate source of
help/prevention by humans

© UCLES 2019 Page 6 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7 Airborne/urban/ground robot delivery system can cause disruption to


pedestrians/cars/aircraft
Sidewalks/pavements are already overcrowded
Sidewalks/pavements are subject to local ordinances/byelaws
covering/restricting use by vehicles
Urban/ground robot delivery system may need special roads/routes to be
built/set aside
Urban/ground robot delivery systems travel at low speeds
Urban/ground robot delivery systems have difficulties avoiding
objects/people/crossing roads.

Question Answer Marks

8(a) Six from: 6

Use of user ID with password/PIN known only to user


Request random selection of three of the digits of password/PIN
Transaction authentication number sent to customer/generated by code
machine held by customer or by number on screen/sent to cell phone of
customer
... OTP/TAN is entered after user ID/password/PIN as next level of
authentication
... OTP/TAN checked against list issued to/held by customer
Use of one-time password generated by a security token
Multi-factor authentication using tokens/sequence of characters
Use of security questions/memorable words plus example
Use of biometrics such as fingerprint/retinal scan
Query use of different devices to log in.

8(b) Six from: 6

IP security (IPsec) encrypting the data in the packet/encrypting entire packet


Layer 2 Tunnel Protocol (L2TP) and IPsec where L2TP creates the tunnel
while IPsec does the encryption
Secure Socket Layer/SSL creates handshake system in conjunction with
Transport Layer Security/TLS
Point-to-Point Tunnelling Protocol/PPTP to create a tunnel and encapsulate
the data packet
An additional protocol will handle the encryption, e.g. TCP Secure Shell (SSH)
SSH will create the tunnel and carry out the encryption of the tunnel (not the
data).

© UCLES 2019 Page 7 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9 Two from: 6

MOOC and online tutorials both use the World Wide Web
MOOC and online tutorials are both interactive using multimedia
With both, courses are either bought off-the shelf or custom built
Students will learn in isolation i.e.as individuals

Four from:

MOOC provides interactive user forums whereas online tutorials do not


provide these
MOOC content can be re-interpreted by students leading to loss of control by
the instructors whereas online tutorials are fixed in in their aims/objectives.
MOOC covers more content than a tutorial because tutorials are focussed on
one/limited topic(s)
MOOC are more easily scalable to encompass more content than online
tutorials
Unlike an online course which focuses more on content, MOOCs focus more
on context.
Online courses are closed-ended with static content whereas the content in a
MOOC evolves dynamically through learner participation

Question Answer Marks

10 Four from: 4

Bit rate represents the amount of information/data that is stored per unit time
in the streamed/recorded video
Bandwidth of available connections determines bit rate that can be used for
the video
If transmission medium does not have sufficient bandwidth to carry the
required bit rate the video will stall/be jerky/impose constant buffering
... and reduce the viewer’s quality of experience of the video
Video can be sampled at different bit rates/compressed to different bit rates
Low bit rates produce video that lacks detail/is pixelated/shows motion in jerky
steps
The more bits that are used the higher the quality of the video e.g.
... 16 kbit/s is suitable only for video phone applications as detail is
lacking/any significant movement pixelates the image
... 2.5 Mbit/s is suitable for low quality internet streaming
... 9.6 Mbit/s is DVD quality
... 8 to 15 Mbit/s is HD quality
... 40 Mbit/s will allow 1080p/Blu-ray disc quality for the video.

© UCLES 2019 Page 8 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

11 Eight from: 8

Removal of ‘Private barrier’/structure:

Freehand selection tool(s) to select irregular objects/barrier structure


elements
Cut tool to remove object from the image
Colour picker tool to select background colour next to/behind barrier
Paint(brush) tool to fill in area where barrier removed/paint over barrier
structure
... using selected colour to match backgrounds/blend with backgrounds where
barrier was
Use a tool which allows cloning to fill pixels that were removed/use of clone
tool/select and copy and paste to disguise where shadow of barrier was on
path

Addition of new lamp post:

Freehand select tool to draw around existing lamp post/select lamp post
Copy/paste tools to copy lamp post to clipboard (leaving existing in place)
Create new layer for additional lamp post/paste new lamp post into
layer/image
Position new lamp post to precise position required

Clean up pasted image:

Colour picker tool to select colour to be painted into edges of added image
and paint tool used to fill pixels around image to make it ‘blend’ in
Use of appropriate brush size

Adding text for title:

Create new layers for text and path


Type text and create/draw path for the text
Use text to path to create shaped text
Position text/title
Remove temporary layers used to construct title

Finalising image:

Merge layers (down) to ‘flatten’ image.

© UCLES 2019 Page 9 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12 Correct order should be: 5

56 39 27 18 4

5 Download and install ‘app’ on the smartphone


6 Identify the problem with the code by running the ‘app’
3 Create a theory as to which lines/areas/blocks/sections of code are
causing the unreliability
9 Test the theory to see if the unreliability can be replicated elsewhere
2 Create a plan to correct the code
7 Suggest corrections that could correct the unreliability
1 Check that the plan will solve the unreliability issue
8 Test the suggested corrections
4 Write a report on the results of the testing

Max 5 from:

1st and 2nd correct – 1 mark


3rd and 4th correct – 1 mark
5th and 6th correct – 1 mark
7th and 8th correct – 1 mark
9th correct – 1 mark.

Question Answer Marks

13 Four descriptions from e.g.: 4

Tools to create plan:

Editing tools:

The required dimensions of the room are entered


Location/position of windows and doors are entered
Objects are brought in from the image library and positioned
Chairs and cupboards are rotated/flipped/mirrored using rotate/flip tool
Chairs are replicated/copied and pasted
Use a fill tool to colour the objects
Flip/mirror image objects

Tools to create 3D images:

Push tool used to pull 2D object into 3D


Drag/pull tool used to move image/pull image around to show interior/other
views.

© UCLES 2019 Page 10 of 11


9626/32 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

14 Four from: 4

Advantages:

You can see inside the patient without the need for surgery
Can look at patient’s condition from more angles than using exploratory
surgery
Can see what's happening with the anatomy while carrying out a procedure
Makes training more realistic – three dimensional rather than two

Disadvantages:

Initial cost of the machinery/software required to produce holographs


Expense of training technicians/doctors to use software
Greater disk storage space is needed than with X-ray images.

© UCLES 2019 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/33


Paper 3 Advanced Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 11 printed pages.

© UCLES 2019 [Turn over


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1(a) Accumulates goods ready for purchase 2


Calculates total cost of purchases for user to approve/check.

1(b) Eight from: 8

Web server software to host the store


Database to store information about items being sold
Interface for staff to update database of items
Search engine to enable customers to search for items
Software to enable customers to create accounts
Security software to check log in details
Security software to authenticate bank details
Firewalls to help prevent hacking
Backup software to make backups of the database and website
Store front view to show customers details of items/products
Administration section to allow merchant to manage the online shop
... by editing/adding products
... by editing/amending prices
... by managing discounts
... by managing shipping costs
Allow appearance/skin to be changed to match shop web site
Allow a guest account so customer does not need to create a personal
account
Allow customer to ship to multiple addresses
Provide suggestions for further purchases
Allow products to be saved for future use/re-ordering/provide ‘wish lists’
Provide for return of goods
Provide system for customer loyalty reward
Database of customer records/details
System for online chat/help
System for FAQs to be shown.

Question Answer Marks

2(a) Three protocols from e.g.: 3

FTP/file transfer protocol for uploading data/files/pages to server


HTTP/hypertext transfer protocol for accessing web pages
HTTPS/hypertext transfer protocol secure for secure data transfer
SMTP/IMAP/POP to send/receive emails
TCP/IP for packet transmission
SSH for secure access to a server/another workstation
SFTP for secure method of uploading data to a server
SMB for transferring files to a file server
TELNET to connect computers to a switch/router.

© UCLES 2019 Page 3 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2(b) Four from: 4

Uses radio waves in 2.4 GHz/5 Ghz frequency ranges/(900 MHz and
3.6/60 GHz frequency bands)
Data frames are modulated onto carrier wave
Spread spectrum used for higher power levels
Two channels used for full duplex exchange of data/most WiFi is half-duplex
WiFi network uses SSID to identify itself
Access point and device must be connected to same WiFi network/SSID to be
able to exchange data
Data is encrypted for security during transmission
Devices must use IEEE 802.11 protocols/standards
IEEE 802.11 has a number of variants a/b/g/n/ac(/ad/ah/aj/ax/ay/az) (must
have 3 to gain this extra mark)
14 channels on 2.4 GHz which are 5 MHz spaced/device uses channels
spaced apart to reduce channel interference.

2(c) Candidates may refer to e.g.: 6

Two similarities from:

They are both communication systems


Both use wireless technology
Both have more limited range than cabled networks
Both have limited bandwidth compared to cable networks

Four differences from:

Bluetooth has a shorter range than WiFi


Bluetooth is restricted by solid objects/barriers/walls whereas WiFi can
penetrate most barriers to some extent
Bluetooth has a lower bandwidth than WiFi
Bluetooth requires ‘pairing’ of devices whereas WiFi (often/usually) requires a
full log in procedure
Bluetooth data transfer is ‘one to one’ whereas WiFi facilitates communication
between several devices.

© UCLES 2019 Page 4 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3 Three from: 3

Max One from:

Alpha testing is carried out by the developers whereas beta testing is carried
out by users
Alpha testing includes both black box testing and white box testing
Alpha Testing is carried out before the launch of software product into the
market
Beta testing is always a black box testing or a functional testing
Beta Testing is done at the time of software product marketing

Max Three from:

Beta testing reduces product failure risks


Beta testing audiences give a more objective view than employees carrying
out alpha testing
Beta testing is carried out on a nearly complete system whereas alpha testing
will encounter far more bugs.
Alpha testers will provide a more technical analysis of the faults of the system.

© UCLES 2019 Page 5 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

4 Command word: Evaluate: discuss the importance of, weigh up, the 8
advantages and disadvantages, judge the overall effectiveness, weigh up
your opinions.

Eight from:

Advantages:

Large amounts of information may be gathered from many responders in a


shorter time than interviewing
Unlike with questionnaires, interviewees might try and provide answers which
they think the interviewer wants to hear
Can be carried out by any number of researchers with little effect on the
reliability and validity of the data
Easier to analyse quantitatively than interviews

Disadvantages:

Cannot see the process as a whole as you would with observation


Cannot move away from their ‘script’ and ask a more in-depth question as
they could with interviews
Cannot interpret body language as would be possible with
observation/interviews
Do not have to arrange a set time as would be required for interviews
Questionnaires can lead to people not telling the truth as they are
anonymous, which is less likely with interviews
Questions cannot be changed once they are typed up unlike interviews
Follow up questions cannot be asked unlike interviews
More difficult to interpret emotions/feelings on a subject
Cannot determine how much thought/consideration has been given to the
answers by respondents
Cannot have questions explained as to their purpose/meaning unlike
interviews.

© UCLES 2019 Page 6 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(a) Ten from: 10

Week 1 Week 2 Week 3 Week 4


Day Day Day Day
Activity
code 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5 1 2 3 4 5
A
B
C
D
E
F
G
H

(Critical path is white and shown for part (b))

Marks allocated as follows:

Correct positioning of activities A and B on Week 1 Day 1


Correct length of activity B at Week 1 Day 1 to Week 2 Day 1 (6 working
days)
Correct positioning of activity C after activity A
Correct length of activity C at Week 1 day 5 to Week 2 day 4 (5 working days)
Correct positioning of activity D after activity B
Correct length of activity D at Week 2 day 2 to Week 3 day 1 (5 working days)
Correct positioning of activity E after activity D
Correct length of activity E at 3 days (Week 3 day 2 to Week 3 day 4)
Correct positioning of activity F after activity C
Correct length of activity F at 3 days
Correct positioning of activity G after activity F (D has already ended)
Correct length of activity G at 3 days
Correct positioning of activity H after activity F
Correct length of activity H at 7 days (Week 3 day 3 to week 4 day 4).

5(b) Activities A, C, F and H – 1 mark 2


Length is 19 days – 1 mark

© UCLES 2019 Page 7 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6 Command word: Discuss: give important arguments for and against. Often 8
requires a conclusion.

This question to be marked as a Level of Response.

Level 3 (7–8 marks)

Candidates will evaluate in detail the benefits and drawbacks of the use of
copper cables
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used accurately and appropriately.

Level 2 (4–6 marks)

Candidates will explain the benefits and drawbacks of the use of copper
cables
For the most part, the information will be relevant and presented in a
structured and coherent format.
There may be a reasoned conclusion/opinion.
Subject specific terminology will be used appropriately and for the most part
correctly.

Level 1 (1–3 marks)

Candidates will describe at least one benefit and at least one drawback of the
use of copper cables
Answers may be in the form of a list.
There will be little or no use of specialist terms.

Level 0 (0 marks): Response with no valid content.

Answers may include reference to:

Benefits:

Flexible so can be installed almost anywhere/can use ‘tight’ bends


Can run electrical power along copper cable/Ethernet cable
Can supply power to remote devices e.g. cameras high on buildings do not
need separate power supply
Costs of installation are less than for fibre optic cables
NICs that use copper connections are cheaper to buy than those that use e.g.
fibre optic
Can provide higher bandwidths than wireless/WiFi
Harder to hack into compared to WiFi

Drawbacks:

Can be subject to electrical interference


Must not be run next to mains power cables
Costs of installation are more than for wireless/WiFi
Cannot provide as high bandwidths as fibre optic

© UCLES 2019 Page 8 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

6 Break/lose contact/connection more frequently than fibre optic cables


Easier to connect into by unauthorised users
More of a safety/tripping hazard than WiFi.

Question Answer Marks

7(a) Three from: 3

Rapid access to (lost/removed) data/files


Protection of data/files against power loss/failure of main system
Protects against failure of storage system/hard disk
Protects against loss of data from viruses/malware
Protects against failure of OS.

7(b) Three from: 3

Backups will store malware as well as safe data


Backups will not remove malware
Backups will restore data to time before malware infection but latest data will
be lost
Backups may not store up to date data if run during office/use hours
Backups take snapshot of data which may change soon after backup is run so
some data may not be backed up
Backups can be stolen in their entirety
If not encrypted all data can be stolen/accessed
Backup windows should use system downtime which may be limited to out of
hours’ time
System performance is reduced when backups are being carried out
Restoration of data after malware infection can be laborious and time
consuming
Cost of extra hardware/storage may be excessive.

Question Answer Marks

8 Six from: 6

Acts as gateway between LAN and WAN/internet


Allows use of multiple (internal) IP addresses through one (external) IP
address on internet
Many computing devices/computers can be used through one internet
connection
Presents single IP address to exterior networks/internet (as number of
external IP addresses is limited)
Acts as a central device/node for logging/monitoring of internet access/activity
Acts as a central device/node for filtering of internet access/activity
Controls/requires username and password for internet access/activity
Prevents access to inappropriate material/activities
Acts as a cache for frequently used remote resources
Reduces access times/network traffic over internet connection.

© UCLES 2019 Page 9 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9(a) Eight from: 8

Anti-malware/virus/spyware software to protect against viruses and spyware.

Firewall (software or hardware) to help to prevent unauthorised access to


company network
Firewall to help to prevent unauthorised access to files stored by cloud
storage provider
Only allow access to company devices/laptops/smartphones
Firewall to enforce company security polices
Firewall to interrogate data packets entering/leaving company networks/cloud
storage providers
Firewall works by comparing contents of packets with predetermined/user
defined rules

Router to direct data packets to/from internet from/to company network/Cloud


storage provider
Router maintains database/list/table of IP addresses to forward packets
Router updates list from other routers as addresses become known to it
Router ranks entries in table according to probability of being correct address
for packet to take on its route to destination
Router maintains list/table of other routers to send packet if route is unknown.

X should use encryption to secure the data for transmission


Passwords and user IDs should be required by the access/firewall software
before allowing devices to connect/access.

For 8 marks, must have at least 1 mark from each of firewall, router and
encryption.

9(b) Four from: 4

Locations B and C are open to the public/any device can connect so there is
no secure connection at these locations
Data may not be encrypted
Location B could be used by hackers using Man in Middle (MIM) to route data
through hacker computer
Location B may be susceptible to fake/spoof/unauthorised wireless access
points/connections
Location B may be susceptible to intercepting wireless signals from company
devices as there is no check on users of cafes/can sit anywhere without
reason/identification.

© UCLES 2019 Page 10 of 11


9626/33 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

10 Six from: 6

Photographs opened in image editor


Person image cut out from photograph 1/Fig. 10.1
Mask around person is created to cover background
Selection to be cut is highlighted/drawn
Selection is modified around edges to ensure accuracy
Using of adjustable nib for drawing tool
Cut unwanted parts of image of woman
Background of cut image changed to transparent
Copy cut out (to clipboard)
Create new layer for image of woman
Import/paste cut out into image of office/photograph of office/Fig. 10.2
Place new image in correct position
Resize image of woman (as required to fit in image of office)
Bring to front/back as necessary
Flatten/merge layers (if required)
Correct new image for overlap/misplaced parts/pixels of imported image
Crop area of new image/photograph 2 as required.

Question Answer Marks

11 Six from: 6

Line 4 declares the variable/var length to hold one side of rectangle


Line 5 declares the variable/var width to hold other side of rectangle
parseFloat (prompt(“”)); used to display message
parseFloat (prompt(“”)); used to collect values for both sides of rectangle
parseFloat (prompt(“”)); used to create a (text) box for the user to enter the
values
Variable/var calc_area is declared to calculate the area
Holds result of calculation
document.write() is used to display the messages on screen about the
values/area of the rectangle
Displays the results of the calculation/contents of var calc_area.

© UCLES 2019 Page 11 of 11


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/11


Paper 1 Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1 4
You only have to gather as much or as little data as you need. 3

It allows data to be gathered from subjects to which the data gatherer


does not have physical access.

You can obtain the data faster than using an indirect data source.

You have full control over the method used to collect the data. 3

A much larger sample size can be used than is possible with indirect
data sources.

A direct data source is quicker to search.

There may be an opportunity to sell the data to other people for them
3
to use.

You do not have to spend time interviewing people or giving out


questionnaires.

A CD ROM of historical data is a direct data source.

The source of the data is known exactly making it easier to judge its
3
reliability.

© UCLES 2019 Page 3 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2 4
Pharming involves sending a website URL, inviting the receiver to go
to the site.

Smishing involves using text messages to persuade people to give 3


out personal information.

Phishing involves installing malicious software on the victim's


computer.

Pharming involves creating a fake website that looks like an actual 3


bank’s website.

Phishing involves the sending of fake emails in order to advertise the


bank.

Vishing involves the fraudster’s computer redirecting a customer’s 3


phone call to his own phone.

Banks can ask you from time to time to send them your full password
to check you are authorised to use that account.

Vishing involves receiving a phone call from a fraudster. 3

Vishing never involves getting the customer to phone the bank.

Smishing is the same as vishing but never involves the use of a


phone.

Question Answer Marks

3(a) The collection of physical components/devices that constitute/are used in a 1


computer system

© UCLES 2019 Page 4 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(b) Two from: 4

A program that helps perform maintenance in a computer system


A program that performs a very specific task usually related to managing
system resources
Operating systems can contain a number of utilities for managing files and
storage devices

Two from:

Examples are:

anti-virus software to remove viruses


back-up software to make copies for future use
data compression utilities to reduce the storage size of a file
disk defragmentation utilities to remove non-contiguous spaces on a disk
disk formatting is preparing a data storage device for initial use
file-copying utilities for the creation of a new file which has the same content
as an existing file
deleting files which is removing a file from a computer's file system

Question Answer Marks

4 Four from: 4

Dynamic data refers to data that is changed «


The data's state is never expected to be the same when re-input
Data on a news website is updated regularly/ as and when necessary/
automatically/often up to date
There is an unlimited amount of information in a news website ...
... it can have information added to it when new facts come to light
May be considered by some to be unreliable as data may be not
authentic/rumour/may not have been verified/there can be many contributors
to a dynamic data source/website so the information can be inaccurate

Question Answer Marks

5(a) IIf([Living_in]=“own home”,“own”,IIf([Living_in]=“landlord”,“rented”,“other”)) 6

,IIf( after “own” – 1 mark


[Living_in]= – 1 mark
“landlord” – 1 mark
,“rented” – 1 mark
,“other”) comes immediately after “rented” – 1 mark
Second closed bracket added at end of statement – 1 mark

© UCLES 2019 Page 5 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(b) Five from: 5

Go to query design
Load/Select the table
Select the fields, Second_name, Name1, Living_in
In fourth column, in field row/ type the query expression
Replace Expr1 with Status
Make sure all fields have the Show option ticked
Save the query
Run the query

Question Answer Marks

6(a) Four from: 4

A mental model is based on belief not facts


It is a form of internal symbol or representation of external reality
It is a model of what users know/think they know about a system
It is a representation of what the user would want/expect in an interface
Users create mental models very quickly, often before they even use the
software or device
Users’ mental models come from their prior experience with similar software
or devices/user interfaces
A conceptual model is the actual model that is given to the user through the
interface of the product
A description of why a mental model is important

6(b) Five from: 5

How colour is to be used, which colour combination is most suitable/which


colours would make it easier to read
The layout of the screen, such as positioning of elements to emphasise
importance/positioning of elements to ensure readability/layout needs to look
organised/grouping of similar items
Increase of font size to emphasise the importance of certain elements/to
ensure readability of information/reduction in font size to conserve space/ to
suit the age of the audience
Only display information the user needs to perform the current
operation/limiting the information to that necessary for the user
Which controls will be required/ buttons, checkboxes, radio buttons, dropdown
lists, list boxes, toggles, date field (at least two)
Which navigational aids will be required such as breadcrumb,
forward/backward buttons, end of file button (at least two)

© UCLES 2019 Page 6 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7 Eight from: 8

Benefits
Both groups of doctors will not waste time travelling to a conference/meeting
with each other
Both groups of doctors will save expense of travelling to a conference/meeting
with each other
All doctors will save time by not staying overnight
Doctors less likely to be fatigued if they have not had to travel long distances
so able to perform better at the meeting
Saves doctors time printing out large amounts of documents
Doctors are less likely to misplace documents «
« as electronic documents can be viewed online
It is safer as accidents can happen on the roads
Meetings can be called at short notice saving doctors time in preparation for a
meeting
It is more environmentally friendly as less car movement is needed
It makes it easier for the doctors who do not work in the hospital to liaise
when necessary/allows hospital doctors to share new treatments with other
doctors
Hospital doctors can demonstrate procedures/treatments to other doctors

Drawbacks
Confidential documents may need to be seen in their original form by both
sets of doctors
There can be poor quality of the video because of bandwidth problems
Lack of bandwidth can lead to problems with time lag
Not all countries have sufficient bandwidth to support video conferencing
Interruption to, or breakdowns of, the transmission can occur
Power cuts/outages are common in some countries, leading to breakdown of
transmission
Both sets of doctors may be concerned that hackers may attempt to hack into
the video conference
Hackers could gain access to patient details
Some video conferences do not have a password/you can just dial into a
video conference so hackers could gain access easily
Difficult to allow doctors to answer in turn
Might be difficult to see all doctors to see who is contributing
Doctors may be put off by the camera, as many people are self-conscious
when being videoed
Doctors away from the hospital may incur costs due to obtaining video
conferencing equipment

At least two of each are required to obtain full marks


There must be a proper evaluation to obtain full marks

© UCLES 2019 Page 7 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

8 Eight from: 8

A flat file database consists of a single table


A flat file database can contain many fields, often with duplicate data
When data is merged between two flat files relevant data needs to be copied
and pasted from one file to the other
If there are two or more flat files containing the same fields, if data in one is
changed the other has to be manually modified
Designing flat file databases is simple and requires little design knowledge
Designing a relational database takes more planning than flat file databases
With flat files information can be added as necessary
A relational database incorporates a number of tables with methods for the
tables to work together
Building a relational database is dependent upon the ability to establish a
relational model ...
... which must fully describe how the data is organised, in terms of data
structure, integrity, querying, manipulation and storage
Relational databases allow defining of certain record fields as keys to perform
search queries, join table records and establish integrity constraints
Table records can be easily joined by the indexed values
Integrity constraints can be established to ensure that table relationships are
valid.

Question Answer Marks

9 Five from: 5

A peer-to-peer network can consist of two or more PCs connected and


sharing resources ...
... without going through a separate server computer
It can also be a permanent infrastructure that links a half-dozen computers in
a small office over copper wires
It can be a network on a much larger scale in which special protocols and
applications set up direct relationships among users over the Internet
Each peer computer has equal privileges with each other
Peer computers allow a portion of their resources to be directly available to
other peer computers «
« such as processing power, disk storage or network bandwidth.

© UCLES 2019 Page 8 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

10(a) Three from: 3

Forward chaining starts with the available data and uses inference rules to
extract more data ...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until
it finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘Then’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Because the data entered determines which rules are selected and used, this
method is called data-driven

10(b) Three from: 3

Backward chaining starts with a list of goals/hypotheses and works backwards


An inference engine using backward chaining would search the inference
rules until it finds one which has a THEN part that matches a desired goal
If the IF part of that rule is known to be true, then it is added to the list of goals
Because the list of goals determines which rules are selected and used, this
method is called goal-driven

Question Answer Marks

11(a) =COUNTIFS($M$3:$M$20,$A3,$L$3:$L$20,1) 6

=COUNTIFS() – 2 marks (COUNTIF – 1 mark)


($M$3:$M$20 – 1 mark
,$A3 – 1 mark
,$L$3:$L$20 – 1 mark
,1) – 1 mark

or
=COUNTIFS($L$3:$L$20,1,$M$3:$M$20,$A3)

=COUNTIFS() – 2 marks (COUNTIF – 1 mark)


($L$3:$L$20 – 1 mark
,1 – 1 mark
,$M$3:$M$20 – 1 mark
,$A3) – 1 mark

$ signs before letters are optional

11(b) =VALUE(LEFT(I3,3))/O3 5

=VALUE() – 1 mark
(LEFT() – 1 mark
I3, – 1 mark
3) – 1 mark
/O3 – 1 mark

All cell references must be relative but can have $ in front of letters

© UCLES 2019 Page 9 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

11(c) Four from: 4


Highlight M3:M20
Click on data then on data validation
Ensure Settings is highlighted and click on drop down menu under Allow
Click on list then go to Source window
Type in =$A$3:$A$10 / individual codes for countries separated by commas
and click OK

11(d) 3
Highlight cells H3:Q20 «
« Sort on column K ascending «
« add a level and sort on Column I descending

© UCLES 2019 Page 10 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12 To be marked as a level of response: 8

Level 3 (7–8 marks)

Candidates will describe the advantages and disadvantages of both types of


software
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately

Level 2 (4–6 marks)

Candidates will describe the advantages and disadvantages of at least one


type of software although development of some of the points will be limited
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)

Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)

Response with no valid content.

Candidates may refer to e.g.

Benefits of spreadsheets
The amount of learning required by the principal to use spreadsheets is not as
much as that for databases ...
... it’s easier to use spreadsheets and get solutions straight away
Spreadsheets are easier to use to store student data/perform numerical
calculations on exam scores/format cells/adjust layouts to generate output
and reports
Easier to create complex formulae such as exam scores per teaching group in
spreadsheets
Easier to use functions to calculate average exam scores in spreadsheets
Repeated data such as names or classes can be easier to enter using
spreadsheet software
Charts to show student progress are easier to produce using spreadsheets

Drawbacks of spreadsheets
As work gets more complex, such as an increase in the number of students,
spreadsheets become more difficult to change and manage
Spreadsheets are good for creating one-time analysis such as exam scores
for one year, but become problematic as the data grows and evolves over
time
As new rows and columns are added for extra scores and students, ranges
and formulas may need to be modified or new ones created

© UCLES 2019 Page 11 of 12


9626/11 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12 Benefits of databases
Data structure and normalisation are available through multiple tables
Data and referential integrity is inbuilt
Queries and reports on student progress/exam score trends are easier to
create with databases

Drawbacks of databases
They take more skill and training for the principal to use well
Structuring the information so it's easy to edit, query, view, and report can be
difficult for the principal (if normalisation is employed)
Creating a database is more complicated for the principal than just entering
data in the cells of a spreadsheet
It is not as easy to copy and paste blocks of data

A hybrid solution where data from a database is exported or copied to a


spreadsheet is often the best solution

© UCLES 2019 Page 12 of 12


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/12


Paper 1 Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 10 printed pages.

© UCLES 2019 [Turn over


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1
It may involve having to purchase more data loggers 4

Several people would have to be employed to carry out interviews

It always takes longer to gather data from an indirect data source

It is impossible to ensure that data was collected from a


3
representative sample

The data may be out of date 3

The sample size is always smaller than if you used a direct data
source

The purpose for which data was collected originally may be quite
3
different from the purpose of the current research

There may be no data available. The data required has simply never
3
been recorded

The coding used in the data is never explained

Compared to direct data sources, using indirect data sources is


always very expensive when preparing and carrying out the
gathering of data

Question Answer Marks

2 3 4
A motherboard has a collection of chips and controllers known as the
chipset

A hard disk drive usually has less storage capacity than the RAM
within a computer

ROM is the memory used to store documents the user is currently


working on

The hard disk drive is used to store application software 3

A solid state drive has no moving parts 3

RAM is memory that cannot be changed

A hard disk drive uses flash memory to store data

RAM stores the start up instructions of a computer even when it is


switched off

A PC can still work without having a CPU

The arithmetic logic unit and the control unit are part of the CPU in a 3
computer

© UCLES 2019 Page 3 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(a) Three from: 3

Costs more to pay programmers to write code specifically for the task/users’
needs/don’t share development costs with other users
Testing is limited to what the programmers think may be required ...
... based on how they think the software will be used
Support is limited to the team of programmers only
Can take a long time to develop the software
There may be a lot of bugs as it has not been tested so thoroughly/has not
been used before

3(b) Three from: 3

It is designed specifically for the task/customers’ requirements


There will be no unnecessary features
It does not have to be adapted for use
Programmers are available to make any changes required/rectify bugs
Programmers will ensure that it is compatible with the existing system and
software

Question Answer Marks

4 Four from: 4

Questions are asked by system


Data/symptoms would be entered by the doctor
Questions based on these would be asked by the expert system
Doctor enters answers to these questions
The system would reason
using IF-THEN rules
System produce probabilities of diagnoses/possible diagnoses
The doctor chooses the most appropriate diagnosis

Question Answer Marks

5(a) VLOOKUP(F3,$C$6:$D$17,2,0) 5

VLOOKUP() – 1 mark
(F3 – 1 mark
,$C$6:$D$17 – 1 mark
,2 – 1 mark
,0) – 1 mark
$ before the column letter is optional

© UCLES 2019 Page 4 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(b) One mark for each step 6

In cell K3 insert a new formula


Enter J3/I3
Highlight K3 and replicate down to K20
Highlight F3:K20
Click on data then click on sort
Click on sort by column K
Select descending order

Question Answer Marks

6 Eight from: 8

A private computer network used within one organisation


Can only be accessed by workers within the organisation/ restricted access
network
Users tend to need user ids and passwords to prevent outsiders using the
intranet
Based on internet technologies/TCP/IP protocols
There is a client-server relationship set up between computers and the
servers
Used to share information/send emails within the organisation
Tends to be a LAN
Has greater security/less susceptible to hackers/viruses than the internet
Intranets have web pages about company events, health and safety policies
and staff newsletters
Contains forms for workers to complete such as claiming expenses/requesting
holidays
Extranet is a means of extending an organisation’s intranet for use by
selected people (outside the organisation)/so that employees can work
remotely
If staff working outside the organisation can access an intranet by using a
VPN this becomes an extranet
Extranet is set up by providing a secure link/firewall to the intranet using the
internet

Examples (max 2 marks) of extranet use could be:


A company could provide access to a supplier for online ordering, order
tracking and inventory management
A hospital providing local doctors with access to a booking system so they
can make appointments for their patients
Pupils could use the school’s intranet to submit work from home
Employees could use the company intranet when working from home

Maximum of 7 marks with no examples

© UCLES 2019 Page 5 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7(a) Application and system (software), compiler is system 1

7(b) Four from: 4

A compiler is a computer program/set of programs


It translates source code/program written in a high level programming
language
It translates source code/program into a lower level language/assembly
language/machine code/object code
It creates an executable program
It translates it for the computer which can only understand machine code to
run
It produces error messages/list of errors to help programmer debug the
program

Question Answer Marks

8(a) 6
Attribute Data type Field Format Type of key
size

Invoice_number Alphanumeric 5 99999 Primary

Number_of_items Numeric/integer – 9 –

Item_cost Numeric/Currency – 999.99 –

Customer_ref Alphanumeric 6 X9999X Foreign

Delivered Boolean – –1/0 –

1 mark for all attributes correctly copied


1 mark for 4/5 data types correct
1 mark for Customer_ref field size correct
1 mark for 4/5 formats correct
1 mark for correct foreign key
1 mark for correct primary key

8(b) Six from: 6

Go to create view and select query design


Load the Invoices table into the window
In the query design next to ‘Field’/in the field row
Type in [Number_of_items]
Then next to it type in *[Item_cost]
Replace Expr1 with total_cost
Save the query
Run the query

8(c)(i) A length check could have been used 2


6 characters is more than 5, which is the length allowed

© UCLES 2019 Page 6 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

8(c)(ii) A range check could have been used 2


12 500 is outside the range 1250–3400 and only numbers in this range are
allowed

8(c)(iii) A format/picture check could have been used 2


L21789 has 1 letter followed by 5 digits when it should be 1 letter followed by
4 digits followed by 1 letter

8(c)(iv) A check digit check could have been used 2


The final digit produced would have been different because of 8 and 9 being
transposed/only numbers with a correct final check digit would be allowed

© UCLES 2019 Page 7 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9 To be marked as a level of response: 8

Level 3 (7–8 marks)

Candidates will describe the advantages and disadvantages of HTTPS


The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
There will be a reasoned conclusion
Specialist terms will be used accurately and appropriately

Level 2 (4–6 marks)

Candidates will describe the advantages and disadvantages of HTTPS


although development of some of the points will be limited
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)

Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)

Response with no valid content.

Candidates may refer to e.g.

Disadvantages
HTTPS uses a lot of server resources ...
... requires processing power and memory for encryption
HTTPS introduces latencies/delays
SSL connections take longer to set up with more roundtrips
Browser caching does not work properly
Modern sites will run slowly without browser caching
Need to buy an SSL certificate issued by certificate authorities
It is possible to make your own certificate but other users will not trust it so
you need to buy one
Warnings can arise that despite using SSL a web page is partially serving
insecure content
The browser may not want users to think a site is totally secure but warning
can be off-putting to many users
There are proxy caching problems
Everything is encrypted including packet headers and content
Any caching that might have happened between the points at which data is
encrypted and decrypted is blocked

© UCLES 2019 Page 8 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

9 Advantages
Messages can’t be read by any third-party
A certificate guarantees the information a browser is receiving originates at
the expected domain
It’s a guarantee that when a user sends sensitive data, it’s being sent to the
right place, and not to a malicious third party
HTTPS connections make man-in-the-middle attacks much more difficult to
execute
Search engines list HTTPS websites higher than sites without HTTPS
The green padlock indicates that your site provider takes security seriously
and this gives users confidence

Question Answer Marks

10 Max five from: 6

Data resources such as databases


Hardware resources of a system
People management and project management applications
Decision support systems/computer program applications used by managers
to gather information to support problem solving and decision making
Executive information systems/a reporting tool that provides quick access to
summarised reports coming from all departments
Marketing Information Systems/systems designed specifically for managing
the marketing aspects of the business
Accounting information systems for accounting functions
Human resource management systems/systems used for personnel aspects
of an organisation/storing records/information about employees
Office automation systems automate workflow, eliminating bottlenecks
School Information Management Systems cover school administration

Max three from:

MIS manager analyses business problems


MIS manager designs and maintains computer applications to solve the
organisation's problems
MIS manager is responsible for training employees to use the system

Question Answer Marks

11(a) Three from: 3

She could use carbon copy paper (which requires less filling of the sheet
feeder)
She could use continuous stationery which would require less human
interaction/doesn’t run out of paper as quickly as inkjet
The ink ribbon lasts longer/cheaper to buy than an inkjet cartridge, saving
costs
When the ink runs out on an inkjet printout is less legible, whereas with a dot
matrix printer the print gets fainter but is still legible

© UCLES 2019 Page 9 of 10


9626/12 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

11(b) Three from: 3

The striking of the heads causes a lot of noise which would be distracting in
an office environment
The quality of output is not so good with a maximum of 240 dpi whereas
inkjets output at 1200 dpi
The speed of output is not as high as an inkjet printer, with the fastest dot
matrix only approaching the speed of the slowest inkjet
The cost of a dot matrix printer to buy is far more expensive than a typical
inkjet
Dot matrix has a more limited character set.

Question Answer Marks

12 Eight from: 8

Advantages

Easier for workers to share work/files in projects


Can access work from any computer
Easier for network manager to roll out new software
Easier for managers to monitor workers' progress
Peripherals can be shared so fewer needed, leading to lower cost in the
future
Company can have an intranet for workers to access
If a server is used workers do not need to worry about making backups

Disadvantages

A server may be required to cope with extra computers, so more expensive


Extra network points/cabling may be needed, which leads to more cost
If the server breaks down company projects might become inaccessible
Viruses are easier to transmit from one computer to another
Easier for disgruntled employees to hack into colleagues' work
A network manager/administrator may need to be employed, leading to extra
costs

Must have at least two of each to gain full marks


Needs to be a proper discussion to gain full marks

© UCLES 2019 Page 10 of 10


Cambridge Assessment International Education
Cambridge International Advanced Subsidiary and Advanced Level

INFORMATION TECHNOLOGY 9626/13


Paper 1 Theory October/November 2019
MARK SCHEME
Maximum Mark: 90

Published

This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.

Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.

Cambridge International will not enter into discussions about these mark schemes.

Cambridge International is publishing the mark schemes for the October/November 2019 series for most
Cambridge IGCSE™, Cambridge International A and AS Level components and some Cambridge O Level
components.

This document consists of 12 printed pages.

© UCLES 2019 [Turn over


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Generic Marking Principles

These general marking principles must be applied by all examiners when marking candidate answers.
They should be applied alongside the specific content of the mark scheme or generic level descriptors
for a question. Each question paper and mark scheme will also comply with these marking principles.

GENERIC MARKING PRINCIPLE 1:

Marks must be awarded in line with:

• the specific content of the mark scheme or the generic level descriptors for the question
• the specific skills defined in the mark scheme or in the generic level descriptors for the question
• the standard of response required by a candidate as exemplified by the standardisation scripts.

GENERIC MARKING PRINCIPLE 2:

Marks awarded are always whole marks (not half marks, or other fractions).

GENERIC MARKING PRINCIPLE 3:

Marks must be awarded positively:

• marks are awarded for correct/valid answers, as defined in the mark scheme. However, credit
is given for valid answers which go beyond the scope of the syllabus and mark scheme,
referring to your Team Leader as appropriate
• marks are awarded when candidates clearly demonstrate what they know and can do
• marks are not deducted for errors
• marks are not deducted for omissions
• answers should only be judged on the quality of spelling, punctuation and grammar when these
features are specifically assessed by the question as indicated by the mark scheme. The
meaning, however, should be unambiguous.

GENERIC MARKING PRINCIPLE 4:

Rules must be applied consistently e.g. in situations where candidates have not followed
instructions or in the application of generic level descriptors.

GENERIC MARKING PRINCIPLE 5:

Marks should be awarded using the full range of marks defined in the mark scheme for the question
(however; the use of the full mark range may be limited according to the quality of the candidate
responses seen).

GENERIC MARKING PRINCIPLE 6:

Marks awarded are based solely on the requirements as defined in the mark scheme. Marks should
not be awarded with grade thresholds or grade descriptors in mind.

© UCLES 2019 Page 2 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

1 4
You only have to gather as much or as little data as you need. 3

It allows data to be gathered from subjects to which the data gatherer


does not have physical access.

You can obtain the data faster than using an indirect data source.

You have full control over the method used to collect the data. 3

A much larger sample size can be used than is possible with indirect
data sources.

A direct data source is quicker to search.

There may be an opportunity to sell the data to other people for them
3
to use.

You do not have to spend time interviewing people or giving out


questionnaires.

A CD ROM of historical data is a direct data source.

The source of the data is known exactly, making it easier to judge its
3
reliability.

© UCLES 2019 Page 3 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

2 4
Pharming involves sending a website URL, inviting the receiver to go
to the site.

Smishing involves using text messages to persuade people to give 3


out personal information.

Phishing involves installing malicious software on the victim's


computer.

Pharming involves creating a fake website that looks like an actual 3


bank’s website.

Phishing involves the sending of fake emails in order to advertise the


bank.

Vishing involves the fraudster’s computer redirecting a customer’s 3


phone call to his own phone.

Banks can ask you from time to time to send them your full password
to check you are authorised to use that account.

Vishing involves receiving a phone call from a fraudster. 3

Vishing never involves getting the customer to phone the bank.

Smishing is the same as vishing but never involves the use of a


phone.

Question Answer Marks

3(a) The collection of physical components/devices that constitute/are used in a 1


computer system

© UCLES 2019 Page 4 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

3(b) Two from: 4

A program that helps perform maintenance in a computer system


A program that performs a very specific task usually related to managing
system resources
Operating systems can contain a number of utilities for managing files and
storage devices

Two from:

Examples are:

anti-virus software to remove viruses


back-up software to make copies for future use
data compression utilities to reduce the storage size of a file
disk defragmentation utilities to remove non-contiguous spaces on a disk
disk formatting is preparing a data storage device for initial use
file-copying utilities for the creation of a new file which has the same content
as an existing file
deleting files, which is removing a file from a computer's file system

Question Answer Marks

4 Four from: 4

Dynamic data refers to data that is changed «


The data's state is never expected to be the same when re-input
Data on a news website is updated regularly/ as and when necessary/
automatically/often up to date
There is an unlimited amount of information in a news website ...
... it can have information added to it when new facts come to light
May be considered by some to be unreliable as data may be not
authentic/rumour/may not have been verified/there can be many contributors
to a dynamic data source/website so the information can be inaccurate

Question Answer Marks

5(a) IIf([Living_in]=“own home”,“own”,IIf([Living_in]=“landlord”,“rented”,“other”)) 6

,IIf( after “own” – 1 mark


[Living_in]= – 1 mark
“landlord” – 1 mark
,“rented” – 1 mark
,“other”) comes immediately after “rented” – 1 mark
Second closed bracket added at end of statement – 1 mark

© UCLES 2019 Page 5 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

5(b) Five from: 5

Go to query design
Load/Select the table
Select the fields, Second_name, Name1, Living_in
In fourth column, in field row/ type the query expression
Replace Expr1 with Status
Make sure all fields have the Show option ticked
Save the query
Run the query

Question Answer Marks

6(a) Four from: 4

A mental model is based on belief not facts


It is a form of internal symbol or representation of external reality
It is a model of what users know/think they know about a system
It is a representation of what the user would want/expect in an interface
Users create mental models very quickly, often before they even use the
software or device
Users’ mental models come from their prior experience with similar software
or devices/user interfaces
A conceptual model is the actual model that is given to the user through the
interface of the product
A description of why a mental model is important

6(b) Five from: 5

How colour is to be used, which colour combination is most suitable/which


colours would make it easier to read
The layout of the screen, such as positioning of elements to emphasise
importance/positioning of elements to ensure readability/layout needs to look
organised/grouping of similar items
Increase of font size to emphasise the importance of certain elements/to
ensure readability of information/reduction in font size to conserve space/ to
suit the age of the audience
Only display information the user needs to perform the current
operation/limiting the information to that necessary for the user
Which controls will be required/ buttons, checkboxes, radio buttons, dropdown
lists, list boxes, toggles, date field (at least two)
Which navigational aids will be required such as breadcrumb,
forward/backward buttons, end of file button (at least two)

© UCLES 2019 Page 6 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

7 Eight from: 8

Benefits
Both groups of doctors will not waste time travelling to a conference/meeting
with each other
Both groups of doctors will save expense of travelling to a conference/meeting
with each other
All doctors will save time by not staying overnight
Doctors less likely to be fatigued if they have not had to travel long distances
so able to perform better at the meeting
Saves doctors time printing out large amounts of documents
Doctors are less likely to misplace documents «
« as electronic documents can be viewed online
It is safer as accidents can happen on the roads
Meetings can be called at short notice saving doctors time in preparation for a
meeting
It is more environmentally friendly as less car movement is needed
It makes it easier for the doctors who do not work in the hospital to liaise
when necessary/allows hospital doctors to share new treatments with other
doctors
Hospital doctors can demonstrate procedures/treatments to other doctors

Drawbacks
Confidential documents may need to be seen in their original form by both
sets of doctors
There can be poor quality of the video because of bandwidth problems
Lack of bandwidth can lead to problems with time lag
Not all countries have sufficient bandwidth to support video conferencing
Interruption to, or breakdowns of, the transmission can occur
Power cuts/outages are common in some countries, leading to breakdown of
transmission
Both sets of doctors may be concerned that hackers may attempt to hack into
the video conference
Hackers could gain access to patient details
Some video conferences do not have a password/you can just dial into a
video conference so hackers could gain access easily
Difficult to allow doctors to answer in turn
Might be difficult to see all doctors to see who is contributing
Doctors may be put off by the camera, as many people are self-conscious
when being videoed
Doctors away from the hospital may incur costs due to obtaining video
conferencing equipment

At least two of each are required to obtain full marks


There must be a proper evaluation to obtain full marks

© UCLES 2019 Page 7 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

8 Eight from: 8

A flat file database consists of a single table


A flat file database can contain many fields, often with duplicate data
When data is merged between two flat files relevant data needs to be copied
and pasted from one file to the other
If there are two or more flat files containing the same fields, if data in one is
changed the other has to be manually modified
Designing flat file databases is simple and requires little design knowledge
Designing a relational database takes more planning than flat file databases
With flat files information can be added as necessary
A relational database incorporates a number of tables with methods for the
tables to work together
Building a relational database is dependent upon the ability to establish a
relational model ...
... which must fully describe how the data is organised, in terms of data
structure, integrity, querying, manipulation and storage
Relational databases allow defining of certain record fields as keys to perform
search queries, join table records and establish integrity constraints
Table records can be easily joined by the indexed values
Integrity constraints can be established to ensure that table relationships are
valid.

Question Answer Marks

9 Five from: 5

A peer-to-peer network can consist of two or more PCs connected and


sharing resources ...
... without going through a separate server computer
It can also be a permanent infrastructure that links a half-dozen computers in
a small office over copper wires
It can be a network on a much larger scale in which special protocols and
applications set up direct relationships among users over the Internet
Each peer computer has equal privileges with each other
Peer computers allow a portion of their resources to be directly available to
other peer computers «
« such as processing power, disk storage or network bandwidth.

© UCLES 2019 Page 8 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

10(a) Three from: 3

Forward chaining starts with the available data and uses inference rules to
extract more data ...
... until a goal is reached
An inference engine using forward chaining searches the inference rules until
it finds one where the IF statement is known to be true
When such a rule is found, the inference engine uses the ‘Then’ part to cause
the addition of new information
Inference engines will iterate through this process until a goal is reached
Because the data entered determines which rules are selected and used, this
method is called data-driven

10(b) Three from: 3

Backward chaining starts with a list of goals/hypotheses and works backwards


An inference engine using backward chaining would search the inference
rules until it finds one which has a THEN part that matches a desired goal
If the IF part of that rule is known to be true, then it is added to the list of goals
Because the list of goals determines which rules are selected and used, this
method is called goal-driven

Question Answer Marks

11(a) =COUNTIFS($M$3:$M$20,$A3,$L$3:$L$20,1) 6

=COUNTIFS() – 2 marks (COUNTIF – 1 mark)


($M$3:$M$20 – 1 mark
,$A3 – 1 mark
,$L$3:$L$20 – 1 mark
,1) – 1 mark

or
=COUNTIFS($L$3:$L$20,1,$M$3:$M$20,$A3)

=COUNTIFS() – 2 marks (COUNTIF – 1 mark)


($L$3:$L$20 – 1 mark
,1 – 1 mark
,$M$3:$M$20 – 1 mark
,$A3) – 1 mark

$ signs before letters are optional

11(b) =VALUE(LEFT(I3,3))/O3 5

=VALUE() – 1 mark
(LEFT() – 1 mark
I3, – 1 mark
3) – 1 mark
/O3 – 1 mark

All cell references must be relative but can have $ in front of letters

© UCLES 2019 Page 9 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

11(c) Four from: 4


Highlight M3:M20
Click on data then on data validation
Ensure Settings is highlighted and click on drop down menu under Allow
Click on list then go to Source window
Type in =$A$3:$A$10 / individual codes for countries separated by commas
and click OK

11(d) 3
Highlight cells H3:Q20 «
« Sort on column K ascending «
« add a level and sort on Column I descending

© UCLES 2019 Page 10 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12 To be marked as a level of response: 8

Level 3 (7–8 marks)

Candidates will describe the advantages and disadvantages of both types of


software
The issues raised will be justified.
The information will be relevant, clear, organised and presented in a
structured and coherent format.
Specialist terms will be used accurately and appropriately

Level 2 (4–6 marks)

Candidates will describe the advantages and disadvantages of at least one


type of software although development of some of the points will be limited
For the most part the information will be relevant and presented in a
structured and coherent format.
Specialist terms will be used appropriately and for the most part correctly.

Level 1 (1–3 marks)

Candidates may only address one side of the argument, and give basic
advantages/disadvantages
Answers may be simplistic with little or no relevance.
There will be little or no use of specialist terms.

Level 0 (0 marks)

Response with no valid content.

Candidates may refer to e.g.

Benefits of spreadsheets
The amount of learning required by the principal to use spreadsheets is not as
much as that for databases ...
... it’s easier to use spreadsheets and get solutions straight away
Spreadsheets are easier to use to store student data/perform numerical
calculations on exam scores/format cells/adjust layouts to generate output
and reports
Easier to create complex formulae such as exam scores per teaching group in
spreadsheets
Easier to use functions to calculate average exam scores in spreadsheets
Repeated data such as names or classes can be easier to enter using
spreadsheet software
Charts to show student progress are easier to produce using spreadsheets

Drawbacks of spreadsheets
As work gets more complex, such as an increase in the number of students,
spreadsheets become more difficult to change and manage
Spreadsheets are good for creating one-time analysis such as exam scores
for one year, but become problematic as the data grows and evolves over
time
As new rows and columns are added for extra scores and students, ranges
and formulas may need to be modified or new ones created

© UCLES 2019 Page 11 of 12


9626/13 Cambridge International AS/A Level – Mark Scheme October/November
PUBLISHED 2019

Question Answer Marks

12 Benefits of databases
Data structure and normalisation are available through multiple tables
Data and referential integrity is inbuilt
Queries and reports on student progress/exam score trends are easier to
create with databases

Drawbacks of databases
They take more skill and training for the principal to use well
Structuring the information so it's easy to edit, query, view, and report can be
difficult for the principal (if normalisation is employed)
Creating a database is more complicated for the principal than just entering
data in the cells of a spreadsheet
It is not as easy to copy and paste blocks of data

A hybrid solution where data from a database is exported or copied to a


spreadsheet is often the best solution

© UCLES 2019 Page 12 of 12

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy