9608_w17_ms_12
9608_w17_ms_12
9608_w17_ms_12
com
Published
This mark scheme is published as an aid to teachers and candidates, to indicate the requirements of the
examination. It shows the basis on which Examiners were instructed to award marks. It does not indicate the
details of the discussions that took place at an Examiners’ meeting before marking began, which would have
considered the acceptability of alternative answers.
Mark schemes should be read in conjunction with the question paper and the Principal Examiner Report for
Teachers.
Cambridge International will not enter into discussions about these mark schemes.
Cambridge International is publishing the mark schemes for the October/November 2017 series for most
®
Cambridge IGCSE , Cambridge International A and AS Level components and some Cambridge O Level
components.
Interrupt Handling
• Halts the execution of the current process
• Stores the values of the current process on the stack
• Loads and executes the appropriate ISR code
• Use of priorities for handling simultaneous interrupts
• Saves data on power outage
Security Management
• Makes provision for recovery when data is lost
• Provides usernames and passwords / encryption / user accounts
• Prevents unauthorised access
• Ensures privacy of data
• Once translated the compiler software is not needed to run the program
• Compiled code should execute faster
• Compiler produces an executable file
• The executable file produced by a compiler can be distributed without users
having sight of the source code // source code is kept secure // users are unable
to make changes to the program
• Cross-compilation is possible
• Easier de-bugging
• The interpreter stops when error encountered
• error can be corrected in real time
• The interpreter translates a statement then executes it immediately
• Parts of the program can be tested, without all the program code being available.
Physical measures
• Locked doors/keyboards etc.
• Secure methods of access, keypads/ biometric scans etc.
Backup of data
• Regular copies of the data are made
• If the data is corrupted it can be restored
Disk-mirroring
• All activity is duplicated to a second disk in real time so that if the first disk fails
there is a complete copy available
Access rights
• Different access rights for individuals/groups of users
• To stop users editing data they are not permitted to access
• By example
Encryption
• If accessed, data cannot be understood by unauthorised personnel
• Accessed only by those with the decryption key
Firewall
• To stop unauthorised access/hackers gaining access to the computer network
Anti-malware program
• To detect / remove / quarantine viruses / key-loggers etc.
• Carrying out regular scans
• Checking that the data entered matches / is consistent with that of the source.
• Comparison of two versions of the data
• Examples include double entry, visual checking, proof reading etc...
• In the event of a mismatch – the user is forced to re-enter the data
• By example, e.g. creation of a password
• Does not check data is sensible/acceptable
Macro
• A group of instructions given a name // subroutine
• A group of instructions that need to be executed several times within the same
program
• The statements are written once and called using the name whenever they need
to be executed
• Macro code is inserted into the source file at each place it is called
• By example
Directive
• An instruction that directs the assembler to do something
• A directive is not a program instruction
• It is information for the assembler
• By example
For example: State the start address for the program //tell the assembler to set aside
space for variables // include an external file etc.
Table entries:
1 Mark per bullet, max 4
• EndProg
• 2 × Unknown
• 9
• 14
• 8
Numbering:
1 Mark per bullet, max 2
7 9
5
Public
Incident B Product
Ethical
Incident C Judgement
Incident D Management
Unethical
Incident E Profession
Incident F Colleagues
Self
• The hard disk has one or more platters made of aluminium or glass
• Each surface of the platter/disk is ferrous-oxide which is capable of being
magnetised
• The platters/disks are mounted on a central spindle
• The disks are rotated at high-speed
• Each surface of the disk has a read/write head mounted on an arm positioned
just above the surface
• Electronic circuits control the movement of the arm and hence the heads
• The surface of the platter/disk is divided into concentric tracks and sectors
• One track in one sector is the basic unit of storage called a block
• The data is encoded as a magnetic pattern for each block
• When writing to disk, a variation in the current in the head produces a variation
in magnetic field on the disk
• When reading from disk, a variation in magnetic field produces a variation in
current through the head
7(a)(i) 1 Mark for correct primary key identified in both STAFF and CLIENT 3
STAFF(StaffID, StaffName, Department)
CLIENT(ClientName, Address, Town)
CLIENT VISIT
VISIT INTERVIEW
INTERVIEW STAFF
UPDATE CLIENT
SET ClientName = 'Albright Holdings'
WHERE ClientName = 'ABC Holdings';
• There may be records in the VISIT and INTERVIEW tables / other tables with
client name ABC Holdings
• The ClientName in the VISIT and INTERVIEW tables / other tables might not
be automatically updated
• Records in the VISIT and INTERVIEW tables / other tables will become
orphaned