UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS
                            General Certificate of Education
                     Advanced Subsidiary Level and Advanced Level

         COMPUTING
         Paper 3
                                                                                   May/June 2004

                                                                                               2 hours
         Additional Materials:   Answer Booklet/Paper




  READ THESE INSTRUCTIONS FIRST

  If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet.
  Write in dark blue or black pen on both sides of the paper.
  You may use a soft pencil for any diagrams, graphs, music or rough working.
  Do not use staples, paper clips, highlighters, glue or correction fluid.

  Answer all questions.
  At the end of the examination, fasten all your work securely together.
  The number of marks is given in brackets [ ] at the end of each question or part question.




                                  This document consists of 4 printed pages.
IB04 06_9691_03/2RP
 UCLES 2004                                                                                        [Turn over
2

1   (a) In relation to databases, describe what is meant by each of the following terms.

         (i) Primary key.                                                                  [1]

        (ii) Secondary key.                                                                [1]

        (iii) Foreign key.                                                                 [1]


    (b) Using, as an example, the database of student records in a school,

         (i) explain why different users should be given different access rights;          [4]

        (ii) describe how these access rights can be implemented.                          [4]


2   Following the widespread access to technology, many workers who previously worked in an
    office are working from home.

    Discuss the benefits and disadvantages to the

         (i) worker,

        (ii) business,

        (iii) society

    of such a change in working patterns.                                                  [9]


3   (a) Describe what is meant by Von Neumann architecture.                                [3]


    (b) Explain the purpose of each of the following special registers in a processor.

         (i) Program Counter (Sequence Control Register).                                  [2]

        (ii) Current Instruction Register.                                                 [2]

        (iii) Memory Address Register.                                                     [2]

        (iv) Memory Data Register.                                                         [2]

        (v) Accumulator.                                                                   [2]


4   Describe what happens during the syntax analysis stage of compilation.                 [5]


5   (a) Describe the objectives of scheduling in a multi-user operating system.            [3]


    (b) Describe two common scheduling policies.                                           [4]


    (c) State five methods by which the priority of a job may be determined.               [5]


 UCLES 2004                                  9691/03/M/J/04
3

6   (a) Represent

         (i) +102,

        (ii) +117

         as 8-bit numbers in two’s complement form.                                                [2]


    (b) (i) Add the answers in part (a) together to give a binary result.                          [2]

        (ii) Turn your binary answer into an equivalent denary result.                             [2]

        (iii) Explain the validity, or otherwise, of your result.                                  [2]


    (c) A stack is to be held in an array. With the aid of a diagram, explain how an item may be

         (i) added to,

        (ii) deleted from

         the stack, while maintaining the integrity of the structure.                              [6]


7   VARIABLE NAME is defined in a particular language as an alphabetic character which may be
    followed by two digits or another alphabetic character.
    Given that, in Backus-Naur Form (BNF), an alphabetic character is called an ALPHA and is
    defined as
    <ALPHA> ::= A|B|C|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z
    and a digit is defined as
    <DIGIT> ::= 0|1|2|3|4|5|6|7|8|9

    (a) Use BNF and the above definitions (that do not need to be written out again), to define
        <VARIABLE NAME>                                                                     [4]


    (b) The definition of a variable name is altered.
        A variable name is now defined as either

                            • an alpha followed by two digits, where the first digit must not be zero,
                              OR
                            • an unlimited set of alpha characters.

         Write new rules in BNF that will define the new <VARIABLE NAME>.                          [4]


8   Explain the part played in network systems by

         (i) switches;

        (ii) routers;

        (iii) bridges;

        (iv) modems.                                                                               [8]


 UCLES 2004                                    9691/03/M/J/04                             [Turn over
4

9     A major software project is being developed by a project manager using SSADM.

      (a) Give four advantages of using SSADM in designing the new system.                                                                               [4]


      (b) Describe two software tools that can assist the work of the project manager.                                                                   [6]




University of Cambridge International Examinations is part of the University of Cambridge Local Examinations Syndicate (UCLES) which is itself a department of
the University of Cambridge.

 UCLES 2004                                                          9691/03/M/J/04

More Related Content

PDF
June 07 P3
PDF
June 08 P3
PDF
Nov 09 P31
PDF
Nov 09 P32
PDF
Nov 03 P3
PDF
June 10 P31
PDF
June 10 P32
PDF
June 10 P33
June 07 P3
June 08 P3
Nov 09 P31
Nov 09 P32
Nov 03 P3
June 10 P31
June 10 P32
June 10 P33

What's hot (20)

PDF
June 06 P3
PDF
Nov 07 P3
PDF
June 04 P31
PDF
Nov 06 P3
PDF
June 02 P1
PDF
June 03 P1
PDF
Nov 03 P1
PDF
Nov 05 P3
PDF
June 05 P1
PDF
Nov 04 P3
PDF
Nov 04 P1
PDF
Nov 02 P1
PDF
June 09 P3
PDF
June 09 P1
PDF
June 03 P3
PDF
June 05 P3
PDF
Nov 06 P1
PDF
Nov 07 P1
PDF
June 07 P1
PDF
Nov 09 P11
June 06 P3
Nov 07 P3
June 04 P31
Nov 06 P3
June 02 P1
June 03 P1
Nov 03 P1
Nov 05 P3
June 05 P1
Nov 04 P3
Nov 04 P1
Nov 02 P1
June 09 P3
June 09 P1
June 03 P3
June 05 P3
Nov 06 P1
Nov 07 P1
June 07 P1
Nov 09 P11
Ad

Similar to June 04 P3 (11)

PDF
Nov 08 P3
PDF
June 10 P13
PDF
Computer paper 3 may june 2004 9691 cambridge General Certificate of educatio...
PDF
Nov 05 P1
PDF
Nov 08 P1
PDF
Nov 09 P12
PDF
June 06 P1
PDF
Nov 08 MS3
PDF
June 10 P12
PDF
Nov 04 MS1
PDF
Nov 09 MS31
Nov 08 P3
June 10 P13
Computer paper 3 may june 2004 9691 cambridge General Certificate of educatio...
Nov 05 P1
Nov 08 P1
Nov 09 P12
June 06 P1
Nov 08 MS3
June 10 P12
Nov 04 MS1
Nov 09 MS31
Ad

More from Samimvez (20)

DOCX
Sql installation tutorial
PDF
Example3
PDF
Coms1010 exam paper - nov10
PDF
Coms1010 exam paper - may 08
PDF
Example2
DOCX
Labsheet 3
DOCX
Labsheet 3,5
DOC
EQ V3x
DOCX
Eq v2
PDF
PDF
PDF
3.10
PDF
PDF
PDF
PDF
PDF
PDF
PDF
PDF
June 02 MS2
Sql installation tutorial
Example3
Coms1010 exam paper - nov10
Coms1010 exam paper - may 08
Example2
Labsheet 3
Labsheet 3,5
EQ V3x
Eq v2
3.10
June 02 MS2

Recently uploaded (20)

PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PPTX
TEXTILE technology diploma scope and career opportunities
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
The various Industrial Revolutions .pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPTX
Configure Apache Mutual Authentication
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Build Your First AI Agent with UiPath.pptx
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Microsoft Excel 365/2024 Beginner's training
Comparative analysis of machine learning models for fake news detection in so...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Custom Battery Pack Design Considerations for Performance and Safety
A proposed approach for plagiarism detection in Myanmar Unicode text
TEXTILE technology diploma scope and career opportunities
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Chapter 5: Probability Theory and Statistics
The various Industrial Revolutions .pptx
Getting started with AI Agents and Multi-Agent Systems
sbt 2.0: go big (Scala Days 2025 edition)
sustainability-14-14877-v2.pddhzftheheeeee
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Configure Apache Mutual Authentication
Consumable AI The What, Why & How for Small Teams.pdf
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Build Your First AI Agent with UiPath.pptx
Convolutional neural network based encoder-decoder for efficient real-time ob...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Excel 365/2024 Beginner's training

June 04 P3

  • 1. UNIVERSITY OF CAMBRIDGE INTERNATIONAL EXAMINATIONS General Certificate of Education Advanced Subsidiary Level and Advanced Level COMPUTING Paper 3 May/June 2004 2 hours Additional Materials: Answer Booklet/Paper READ THESE INSTRUCTIONS FIRST If you have been given an Answer Booklet, follow the instructions on the front cover of the Booklet. Write in dark blue or black pen on both sides of the paper. You may use a soft pencil for any diagrams, graphs, music or rough working. Do not use staples, paper clips, highlighters, glue or correction fluid. Answer all questions. At the end of the examination, fasten all your work securely together. The number of marks is given in brackets [ ] at the end of each question or part question. This document consists of 4 printed pages. IB04 06_9691_03/2RP  UCLES 2004 [Turn over
  • 2. 2 1 (a) In relation to databases, describe what is meant by each of the following terms. (i) Primary key. [1] (ii) Secondary key. [1] (iii) Foreign key. [1] (b) Using, as an example, the database of student records in a school, (i) explain why different users should be given different access rights; [4] (ii) describe how these access rights can be implemented. [4] 2 Following the widespread access to technology, many workers who previously worked in an office are working from home. Discuss the benefits and disadvantages to the (i) worker, (ii) business, (iii) society of such a change in working patterns. [9] 3 (a) Describe what is meant by Von Neumann architecture. [3] (b) Explain the purpose of each of the following special registers in a processor. (i) Program Counter (Sequence Control Register). [2] (ii) Current Instruction Register. [2] (iii) Memory Address Register. [2] (iv) Memory Data Register. [2] (v) Accumulator. [2] 4 Describe what happens during the syntax analysis stage of compilation. [5] 5 (a) Describe the objectives of scheduling in a multi-user operating system. [3] (b) Describe two common scheduling policies. [4] (c) State five methods by which the priority of a job may be determined. [5]  UCLES 2004 9691/03/M/J/04
  • 3. 3 6 (a) Represent (i) +102, (ii) +117 as 8-bit numbers in two’s complement form. [2] (b) (i) Add the answers in part (a) together to give a binary result. [2] (ii) Turn your binary answer into an equivalent denary result. [2] (iii) Explain the validity, or otherwise, of your result. [2] (c) A stack is to be held in an array. With the aid of a diagram, explain how an item may be (i) added to, (ii) deleted from the stack, while maintaining the integrity of the structure. [6] 7 VARIABLE NAME is defined in a particular language as an alphabetic character which may be followed by two digits or another alphabetic character. Given that, in Backus-Naur Form (BNF), an alphabetic character is called an ALPHA and is defined as <ALPHA> ::= A|B|C|D|E|F|G|H|I|J|K|L|M|N|O|P|Q|R|S|T|U|V|W|X|Y|Z and a digit is defined as <DIGIT> ::= 0|1|2|3|4|5|6|7|8|9 (a) Use BNF and the above definitions (that do not need to be written out again), to define <VARIABLE NAME> [4] (b) The definition of a variable name is altered. A variable name is now defined as either • an alpha followed by two digits, where the first digit must not be zero, OR • an unlimited set of alpha characters. Write new rules in BNF that will define the new <VARIABLE NAME>. [4] 8 Explain the part played in network systems by (i) switches; (ii) routers; (iii) bridges; (iv) modems. [8]  UCLES 2004 9691/03/M/J/04 [Turn over
  • 4. 4 9 A major software project is being developed by a project manager using SSADM. (a) Give four advantages of using SSADM in designing the new system. [4] (b) Describe two software tools that can assist the work of the project manager. [6] University of Cambridge International Examinations is part of the University of Cambridge Local Examinations Syndicate (UCLES) which is itself a department of the University of Cambridge.  UCLES 2004 9691/03/M/J/04