0% found this document useful (0 votes)
276 views20 pages

Cambridge International AS & A Level: Computer Science 9618/11

Uploaded by

Joseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
276 views20 pages

Cambridge International AS & A Level: Computer Science 9618/11

Uploaded by

Joseph
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

* 0000800000001 *

, ,

Cambridge International AS & A Level

¬WŠ. 4mHuOªEŠ^{6€W
¬j–tS¬–|Osm†li¨™~‚
¥E¥U55¥•¥eUE UeuUU
* 5 0 8 2 3 3 9 5 5 9 *

COMPUTER SCIENCE 9618/11


Paper 1 Theory Fundamentals May/June 2025

1 hour 30 minutes

You must answer on the question paper.

No additional materials are needed.

INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.

INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.

This document has 20 pages. Any blank pages are indicated.

DC (SL/FC) 341015/3
© UCLES 2025 [Turn over
* 0000800000002 *

DO NOT WRITE IN THIS MARGIN


2
, ,

1 (a) Write the logic expressions for the following logic circuit.

X
Q

DO NOT WRITE IN THIS MARGIN


R Y

X = ............................................................................................................................................

Y = ............................................................................................................................................

DO NOT WRITE IN THIS MARGIN


[2]

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÕĊ®Ġ´íÈõÏĪÅĊßù¸þ×
© UCLES 2025 ĬêĘóÒĠĒĎèþċĩĔÓØáĆĂ
ĥĕõÕõÕåõÕĥąąąĕŵõÕ
9618/11/M/J/25
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN

3
, ,

(b) Complete the truth table for the following logic circuit.

X
DO NOT WRITE IN THIS MARGIN

A B C Working space X

0 0 0

0 0 1
DO NOT WRITE IN THIS MARGIN

0 1 0

0 1 1

1 0 0

1 0 1

1 1 0

1 1 1
DO NOT WRITE IN THIS MARGIN

[2]
DO NOT WRITE IN THIS MARGIN

Ĭ×Ċ®Ġ´íÈõÏĪÅĊßû¸þ×
© UCLES 2025 ĬêėôÚĪĎĞÑüöàÈëĄáöĂ
ĥĕąĕµµÅĕÅĕÕąąõåõĥÕ
9618/11/M/J/25 [Turn over
* 0000800000004 *

DO NOT WRITE IN THIS MARGIN


4
, ,

2 Programmers in a software development company take part in live video conferences to discuss
their work.

The live video conferences take place using real‑time bit streaming. The video is compressed
before it is transmitted.

(a) Explain how data is transferred using real‑time bit streaming.

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

DO NOT WRITE IN THIS MARGIN


(b) (i) Explain the reasons why a video is compressed before it is transmitted using real‑time
bit streaming.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN

ĬÕĊ®Ġ´íÈõÏĪÅĊÝù¸Ā×
© UCLES 2025 ĬêėñÚĤĠīæöíçĦćâ±þĂ
ĥåÕĕõµÅµåµåąÅõąõõÕ
9618/11/M/J/25
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN

5
, ,

(ii) Identify whether the lossy or lossless compression method is more appropriate for
real‑time bit streaming. Justify your answer.

Compression method ........................................................................................................

Justification .......................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................
[3]

(c) The video conference is accessed over the internet.

Complete the table by stating how modems and dedicated lines are used when data is
transmitted over the internet.
DO NOT WRITE IN THIS MARGIN

Hardware Use

......................................................................................................
modems
......................................................................................................

......................................................................................................
dedicated
lines ......................................................................................................
DO NOT WRITE IN THIS MARGIN

[2]
DO NOT WRITE IN THIS MARGIN

Ĭ×Ċ®Ġ´íÈõÏĪÅĊÝû¸Ā×
© UCLES 2025 ĬêĘòÒĦĤěÓĄĄĢ²ïö±îĂ
ĥååÕµÕåÕµÅõąÅĕĥµĥÕ
9618/11/M/J/25 [Turn over
* 0000800000006 *

DO NOT WRITE IN THIS MARGIN


6
, ,

3 A computer stores images and text files.

(a) One of the images is a bitmapped image.

Complete the table by writing the answer for each statement.

Statement Answer

the term for the smallest


element that makes up

DO NOT WRITE IN THIS MARGIN


an image

the largest number of


different colours that can
be represented with a bit
depth of 8 bits

the term for the dots per


inch (dpi) when an image

DO NOT WRITE IN THIS MARGIN


is displayed

[3]

(b) The text in the files is stored using the Unicode character set.

(i) Give two advantages of using the Unicode character set instead of using the ASCII
character set.

1 ........................................................................................................................................

...........................................................................................................................................

DO NOT WRITE IN THIS MARGIN


2 ........................................................................................................................................

...........................................................................................................................................
[2]

(ii) The Unicode character '❮' has the binary value: 0010 0111 0110 1110
Convert the binary value for the character '❮' into denary.

..................................................................................................................................... [1]
DO NOT WRITE IN THIS MARGIN

(iii) The Unicode character '⅀' has the hexadecimal value 2140

Convert the hexadecimal code for the character '⅀' into denary.

..................................................................................................................................... [1]

ĬÙĊ®Ġ´íÈõÏĪÅĊàûµþ×
© UCLES 2025 ĬêėòÍĠČđÛćñěÒćėęþĂ
ĥõąÕµõåõõåÕąąĕÅõµÕ
9618/11/M/J/25
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN

7
, ,

4 A shop installs a new system that allows users to purchase items without going through a manual
checkout.

The new system:

• identifies customers when they enter the shop and matches them to their account
• prevents a customer from walking through the automatic barriers if they do not have an
account
• automatically detects the items that a customer has taken from a shelf and charges these to
the customer’s account.
DO NOT WRITE IN THIS MARGIN

(a) The new system uses digital cameras and Artificial Intelligence (AI) to identify the customers.

Explain how the new system uses AI to identify each customer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]

(b) The new system uses sensors to identify the items taken from a shelf.
DO NOT WRITE IN THIS MARGIN

Identify one type of sensor that can be used in this new system.

State how the sensor can be used to identify the items taken from a shelf.

Sensor ......................................................................................................................................

Use ...........................................................................................................................................

...................................................................................................................................................
[2]
DO NOT WRITE IN THIS MARGIN

ĬÛĊ®Ġ´íÈõÏĪÅĊàùµþ×
© UCLES 2025 ĬêĘñÕĪĈġÞñĀÎĆïÃęîĂ
ĥõõĕõĕÅĕĥÕąąąõåµåÕ
9618/11/M/J/25 [Turn over
* 0000800000008 *

DO NOT WRITE IN THIS MARGIN


8
,  ,

5 A company builds and sells furniture to customers. The company stores data about customers,
their payment cards and their furniture orders in a database.

The database, FURNITURE, has the following tables:

CUSTOMER(CustomerID, Name, Phone)

CUSTOMER_CARD_DATA(CardID, CustomerID, CardType, CardNumber, EndDate)

ORDER(OrderID, CustomerID, TotalCost, Paid, OrderDate, Complete)

DO NOT WRITE IN THIS MARGIN


ORDER_ITEM(OrderItemID, OrderID, Type, Height, Width, Depth, Details)

The primary keys are underlined in each table.

The attribute Complete in the table ORDER stores the Boolean value TRUE if the order has been
built and FALSE if the order has not been built.

(a) Complete the entity‑relationship (E‑R) diagram for the database.

CUSTOMER CUSTOMER_CARD_DATA

DO NOT WRITE IN THIS MARGIN


ORDER ORDER_ITEM

[3]

(b) Identify one attribute in the table CUSTOMER_CARD_DATA that could be a candidate key.

DO NOT WRITE IN THIS MARGIN


............................................................................................................................................. [1]

(c) Identify two tables in the database that contain one or more foreign keys.
Give one attribute that is a foreign key in each table.

Table Foreign key

2
[2]
DO NOT WRITE IN THIS MARGIN

ĬÙĊ®Ġ´íÈõÏĪÅĊÞûµĀ×
© UCLES 2025 ĬêĘôÕĤöĨÙïćÕèÓġĉĆĂ
ĥÅåĕµĕŵąõõąÅõąµµÕ
9618/11/M/J/25
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN

9
,  ,

(d) Explain the reasons why the data in the table ORDER_ITEM cannot be stored in the table
ORDER

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [3]

(e) Write an Structured Query Language (SQL) script to output the customer ID, the customer’s
name and the total cost of the customer’s orders that have not been paid.

The output of the total cost must have an appropriate title.

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛĊ®Ġ´íÈõÏĪÅĊÞùµĀ×
© UCLES 2025 ĬêėóÍĦúĘàĉúĔôëµĉöĂ
ĥÅÕÕõõåÕĕąåąÅĕĥõåÕ
9618/11/M/J/25 [Turn over
* 0000800000010 *

DO NOT WRITE IN THIS MARGIN


10
, ,

6 A programmer is buying a new computer.

(a) The programmer is considering the following two computers:

Quad‑core 2.2 GHz processor


16‑bit architecture
Computer 1
1 GB Random Access Memory (RAM)
500 GB magnetic hard disk
Dual‑core 3.8 GHz processor
32‑bit architecture

DO NOT WRITE IN THIS MARGIN


Computer 2
2 GB RAM
500 GB solid state drive (SSD)

(i) Computer 1 has a magnetic hard disk.

Complete the description of the principal operation of a magnetic hard disk by writing
the missing words.

The magnetic hard disk has one or more ................................................... that can be

magnetised. These are mounted on a ................................................... and rotate at

DO NOT WRITE IN THIS MARGIN


high speed.

A ................................................... is moved across the surface on an arm.

When data is read, the changes in the ................................................... produce

a change in the electric current.


[4]

(ii) The two computers have different amounts of RAM.

Explain how different amounts of RAM affect the performance of a computer.

DO NOT WRITE IN THIS MARGIN


...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [3]
DO NOT WRITE IN THIS MARGIN

ĬÙĊ®Ġ´íÈõÏĪÅĊßû·þ×
© UCLES 2025 ĬêĕôÐĢîò×øĀïÌÑą±îĂ
ĥĕÅÕµĕĥµåÅõÅÅÕąµąÕ
9618/11/M/J/25
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN

11
, ,

(iii) The two computers have different bus widths.

Explain how different bus widths affect the performance of a computer.

...........................................................................................................................................

...........................................................................................................................................

...........................................................................................................................................

..................................................................................................................................... [2]
DO NOT WRITE IN THIS MARGIN

(b) Both computers have an Operating System (OS).

Describe the purpose of an OS in a computer.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛĊ®Ġ´íÈõÏĪÅĊßù·þ×
© UCLES 2025 ĬêĖóØĨòĂâĂñºĐéѱþĂ
ĥĕµĕõõąÕµµåÅŵĥõĕÕ
9618/11/M/J/25 [Turn over
* 0000800000012 *

DO NOT WRITE IN THIS MARGIN


12
, ,

7 A banker stores personal data on their work computer.

(a) The banker needs to transfer confidential data across the internet.

Identify and describe one method of restricting the risks posed by an unauthorised person
intercepting the data whilst it is being transferred across the internet.

Method ......................................................................................................................................

Description ................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
[3]

(b) The banker receives confidential data across the internet. The data includes a digital
signature.

DO NOT WRITE IN THIS MARGIN


Explain how a digital signature can make sure the data has not been changed during
transmission.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

DO NOT WRITE IN THIS MARGIN


...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

............................................................................................................................................. [5]
DO NOT WRITE IN THIS MARGIN

ĬÙĊ®Ġ´íÈõÏĪÅĊÝû·Ā×
© UCLES 2025 ĬêĖòØĞĄćÕĀú±®ąóáöĂ
ĥåĥĕµõąõÕĕÕÅąµÅõąÕ
9618/11/M/J/25
* 0000800000013 *
DO NOT WRITE IN THIS MARGIN

13
, ,

(c) The data that is transferred can also be verified using a checksum.

Explain how data can be verified using a checksum.

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................

...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN

...................................................................................................................................................

............................................................................................................................................. [3]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

ĬÛĊ®Ġ´íÈõÏĪÅĊÝù·Ā×
© UCLES 2025 ĬêĕñÐĬĀ÷äúćøĪíçáĆĂ
ĥåĕÕõĕĥĕÅĥąÅąÕåµĕÕ
9618/11/M/J/25 [Turn over
* 0000800000014 *

DO NOT WRITE IN THIS MARGIN


14
, ,

8 (a) The following table shows part of the instruction set for a processor. The processor has two
registers: the Accumulator (ACC) and an Index Register (IX).

Instruction
Explanation
Opcode Operand
LDM #n Immediate addressing. Load the number n to ACC
Direct addressing. Load the contents of the location at the given
LDD <address>
address to ACC

DO NOT WRITE IN THIS MARGIN


Indirect addressing. The address to be used is at the given
LDI <address>
address. Load the contents of this second address to ACC
INC <register> Add 1 to the contents of the register (ACC or IX)
STO <address> Store the contents of ACC at the given address
ADD #n/Bn/&n Add the number n to the ACC
DEC <register> Subtract 1 from the contents of the register (ACC or IX)
JMP <address> Jump to the given address
CMP <address> Compare the contents of ACC with the contents of <address>

DO NOT WRITE IN THIS MARGIN


Following a compare instruction, jump to <address> if the
JPE <address>
compare was True
END Return control to the operating system
ACC denotes Accumulator
<address> can be an absolute or a symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001010
& denotes a hexadecimal number, e.g. &4A

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÕĊ®Ġ´íÈõÏĪÅĊÞú¶Ă×
© UCLES 2025 ĬêĖóÍĦóÿÒðĄÛÆèãđþĂ
ĥąĕĕµõåµåõąąÅĕąõÅÕ
9618/11/M/J/25
* 0000800000015 *
DO NOT WRITE IN THIS MARGIN

15
, ,

The current contents of memory are:

address Instruction
80 10
81 8
82 80
83 81

...
DO NOT WRITE IN THIS MARGIN

200 LDD 81
201 INC ACC
202 STO 83
203 LDI 82
204 CMP 83
205 JPE 209
206 LDD 83
207 ADD #10
208 JMP 210
DO NOT WRITE IN THIS MARGIN

209 DEC ACC


210 STO 81
211 END

Trace the program currently in memory using the following trace table.

Memory address
Instruction address ACC
80 81 82 83
10 8 80 81
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

[4]

Ĭ×Ċ®Ġ´íÈõÏĪÅĊÞü¶Ă×
© UCLES 2025 ĬêĕôÕĤïïçĊíĎĒÐ÷đîĂ
ĥąĥÕõĕÅÕµąÕąÅõĥµÕÕ
9618/11/M/J/25 [Turn over
* 0000800000016 *

DO NOT WRITE IN THIS MARGIN


16
, ,

(b) The table shows part of the instruction set for a processor. The processor has one register:
the Accumulator (ACC).

Instruction
Explanation
Opcode Operand
Bitwise AND operation of the contents of ACC with the
AND #n/Bn/&n
operand
Bitwise AND operation of the contents of ACC with the
AND <address>
contents of <address>

DO NOT WRITE IN THIS MARGIN


Bitwise XOR operation of the contents of ACC with the
XOR #n/Bn/&n
operand
Bitwise XOR operation of the contents of ACC with the
XOR <address>
contents of <address>
Bitwise OR operation of the contents of ACC with the
OR #n/Bn/&n
operand
Bitwise OR operation of the contents of ACC with the
OR <address>
contents of <address>
Bits in ACC are shifted logically n places to the left.
LSL #n

DO NOT WRITE IN THIS MARGIN


Zeros are introduced on the right‑hand end
Bits in ACC are shifted logically n places to the right.
LSR #n
Zeros are introduced on the left‑hand end
<address> can be an absolute or symbolic address
# denotes a denary number, e.g. #123
B denotes a binary number, e.g. B01001010
& denotes a hexadecimal number, e.g. &4A

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN

ĬÕĊ®Ġ´íÈõÏĪÅĊàú¶Ą×
© UCLES 2025 ĬêĕñÕĪýúÔĈöĕ´ôÕāĆĂ
ĥµµÕµĕÅõÕååąąõŵÅÕ
9618/11/M/J/25
* 0000800000017 *
DO NOT WRITE IN THIS MARGIN

17
, ,

(i) Write the bit manipulation instruction that can be used to set the least significant bit to 1
in an 8‑bit register. All other bits must remain unchanged.

The instruction needs to work on a register that contains any 8‑bit binary number.

..................................................................................................................................... [1]

(ii) The ACC currently contains the following binary value.

0 1 0 1 0 1 0 1
DO NOT WRITE IN THIS MARGIN

Write the result after the instruction XOR &FE is run.

[1]
(iii) The ACC currently contains the following binary value.

0 1 1 0 1 0 1 1

Write the result after the instruction LSR #5 is run.


DO NOT WRITE IN THIS MARGIN

[1]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Ĭ×Ċ®Ġ´íÈõÏĪÅĊàü¶Ą×
© UCLES 2025 ĬêĖòÍĠāĊåòċÔĨČāāöĂ
ĥµÅĕõõåĕÅÕõąąĕåõÕÕ
9618/11/M/J/25
© UCLES 2025
,
* 0000800000018 *

ĥĥÕĕµĕĥõõĕåÅąÕŵõÕ
ĬêĘñÐĬąĠÎÿí¯Ðò±¹îĂ
ĬÕĊ®Ġ´íÈõÏĪÅĊÝú¸Ă×

,
18

9618/11/M/J/25
BLANK PAGE

DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN

© UCLES 2025
,
* 0000800000019 *

ĥĥåÕõõąĕĥĥõÅąµåõĥÕ
ĬêėòØĞĉĐëùĄúČĊĥ¹þĂ
Ĭ×Ċ®Ġ´íÈõÏĪÅĊÝü¸Ă×

,
19

9618/11/M/J/25
BLANK PAGE
* 0000800000020 *

DO NOT WRITE IN THIS MARGIN


20
, ,

BLANK PAGE

DO NOT WRITE IN THIS MARGIN


DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN

Permission to reproduce items where third‑party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.

To avoid the issue of disclosure of answer‑related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at www.cambridgeinternational.org after the live examination series.

Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÕĊ®Ġ´íÈõÏĪÅĊßú¸Ą×
© UCLES 2025 ĬêėóØĨûęÐ÷ċñêæÇéöĂ
ĥÕõÕµõąµąÅąÅŵąõõÕ
9618/11/M/J/25

You might also like