9608/11/o/n/15 © Ucles 2015
9608/11/o/n/15 © Ucles 2015
9608/11/o/n/15 © Ucles 2015
http://cie.org.uk/computerscience.html
http ....................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
cie.org.uk ...........................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
computerscience.html .......................................................................................................
...........................................................................................................................................
...........................................................................................................................................
[3]
%20 ...................................................................................................................................
...........................................................................................................................................
? ........................................................................................................................................
...........................................................................................................................................
[2]
...............................................................................................................................................[1]
Indicate for each IP address whether it is valid or invalid and give a reason.
Denary / Valid or
Address Reason
Hexadecimal Invalid
3.2A.6AA.BBBB Hexadecimal
2.0.255.1 Denary
6.0.257.6 Denary
A.78.F4.J8 Hexadecimal
[4]
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...............................................................................................................................................[2]
6 (a) Explain the difference between the World Wide Web (WWW) and the Internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) Three methods of connecting devices include fibre-optic cables, copper cables and radio
waves. The table below gives descriptions relating to these connection methods.
Tick (✓) one box on each row to show the method that best fits each description.
(c) Bit streaming is used for both real-time and on-demand services.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(d) A device needs an IP address to connect to the Internet. IPv4 is the more common type of
IP address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[3]
© UCLES 2016 9608/13/M/J/16 [Turn over
12
(e) A computer user keys in the Uniform Resource Locator (URL) of a web page into a web
browser.
Describe how the browser uses the Domain Name Service (DNS) to display the web page.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
7 The design of a web-based application can require the use of client-side scripting.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) A user requests a web page by keying the Uniform Resource Locator (URL) into the address
bar of their web browser.
Describe the sequence of steps leading to the display of the web page on the computer
screen.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[4]
1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Message1 = "ERROR – Order refused";
9 var Message2 = "Product code OK";
10 var x = document.forms["form1"]["txtProductCode"].value;
11 if (x == "")
12 {
13 alert(Message1)
14 }
15 else
16 {
17 alert(Message2)
18 }
19 }
20 </script>
21
22 </head>
23 <body>
24 <form name = form1>
25 <label>Product code: </label>
26 <input type="text" name="txtProductCode" >
27 <label>Number: </label>
28 <input type="text" name="txtNumber" size = "5" >
29 <p>
30 <label>Submit order: </label>
31 <input type="button" name="btnSubmit" Value = "Submit"
32
33 onMouseDown = "myButton_onmousedown()" >
34 </p>
35 </form>
36
37 </body>
38 </html>
(i) The developer has used three variables in the JavaScript code. State the identifiers used.
1 ..................................................................
2 ..................................................................
3 .................................................................. [2]
(ii) The button has an event whose identifier is onMouseDown. When the submit button is
clicked, some code is executed.
(iv) Describe the purpose of the validation check that the code performs.
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Name and describe two other types of validation check that could be appropriate for this
data capture form.
Description ........................................................................................................................
...........................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
(a) Describe what is meant by the term client-server for this application.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...............................................................................................................................................[2]
(b) The following sequence of steps (1 to 5) describes what happens when someone uses their
personal computer (PC) to request a web page. The web page consists of HTML tags and
text content only. Four of the statements from A, B, C, D, E and F are used to complete the
sequence.
A Browser software interprets the script, renders the page and displays.
B Browser software renders the page and displays.
C Browser software compiles the script, renders the page and displays.
D The web server retrieves the page.
E The Domain Name Service (DNS) uses the domain name from the
browser to look up the IP address of the web server.
F The web server sends the web page content to the browser.
Write one of the letters A to F in the appropriate row to complete the sequence.
1. The user keys in the Uniform Resource Locator (URL) into the browser software.
2. ....................................
3. ....................................
4. ....................................
5. ....................................
[4]
(c) The following web page used for data capture consists of:
1 <html>
2 <head>
3 <title>Untitled Document</title>
4 <script language="JavaScript">
5
6 function myButton_onmousedown()
7 {
8 var Output1 = "Runner ID OK";
9 var Output2 = "ERROR – entry refused";
10
11 var Runner ID = document.forms["form1"]["txtRunnerID"].value;
12 // || in Javascript is the 'OR' operator
13 if (RunnerID.substr(0,3) == "VAR" || RunnerID.substr(0,3) == "CAM")
14 {
15 alert(Output1)
16 }
17 else
18 {
19 alert(Output2)
20 }
21 }
22 </script>
23
24 </head>
25 <body>
26 <form name = form1>
27 <label>Runner ID: </label>
28 <input type="text" name="txtRunnerID" >
29 <label>Position: </label>
30 <input type="text" name="txtPosition" size = "5" >
31 <p>
32 <label>Save data: </label>
33 <input type="button" name="btnSubmit" Value = "Submit"
34
35 onMouseDown = "myButton_onmousedown()" >
36 </p>
37 </form>
38
39 </body>
40 </html>
(i) The developer has used three variables in the JavaScript code. State the identifiers
used.
1. ....................................
2. ....................................
3. .................................... [2]
(ii) The button has an event whose identifier is onMouseDown. When the mouse button is
clicked, some code is run.
(iv) Describe the purpose of the validation check that the code performs.
...........................................................................................................................................
.......................................................................................................................................[1]
(v) Name and describe two other types of validation check which could be appropriate for
this data capture form.
Description ........................................................................................................................
...........................................................................................................................................
Description ........................................................................................................................
...........................................................................................................................................
[4]
BLANK PAGE
BLANK PAGE
(a) State how Computer A could access the web page without using a Domain Name Service
(DNS).
...................................................................................................................................................
...............................................................................................................................................[1]
21E5:69AA:FFFF:1:E100:B691:1285:F56E
::255.255.255.255
59FB::1005:CC57:6571
56FE::2159:5BBC::6594
[4]
(ii) The following table shows four statements about either public or private IP addresses.
Tick (3) one box in each row to indicate whether each statement refers to a public or a
private IP address.
1 ................................................................................................................................................
2 ................................................................................................................................................
[2]
2 Gopal types the Uniform Resource Locator (URL) of a website into a web browser.
(a) The following sequence (1 to 5) describes the steps that take place. There are three missing
statements.
2 ......................................
4 ......................................
5 ......................................
Write one of the letters A to C in the appropriate rows (2, 4 and 5) to complete the sequence.
[2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
.............................................................................................................................................. [2]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
3 ........................................................................................................................................
...........................................................................................................................................
[3]
1 ........................................................................................................................................
...........................................................................................................................................
2 ........................................................................................................................................
...........................................................................................................................................
[2]
4 Ava needs to view a website and she knows the Uniform Resource Locator (URL).
1 ..................................................
3 ..................................................
4 ..................................................
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
1 .........................................................................................................................................
...........................................................................................................................................
2 .........................................................................................................................................
...........................................................................................................................................
[2]
Tick (✓) one box in each row to identify whether each description applies to a public or private
IP address.
Circle either Valid or Invalid to indicate whether each address is valid or invalid. Explain your
decision.
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
Explanation ...............................................................................................................................
...................................................................................................................................................
[3]
(b) A website can be accessed using either the Uniform Resource Locator (URL) or the IP
address.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [3]
Complete the following statements by filling in the names of the missing methods of bit
streaming.
................................................. bit streaming is used when watching an event that has taken
place in the past. Existing media are encoded to bit streaming format and uploaded to a
server. It can be paused and rewound.
[2]
© UCLES 2019 9608/11/M/J/19
3
(d) A recording of a concert is stored as a file. The file is compressed using lossy compression
before it is streamed to users.
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
...........................................................................................................................................
..................................................................................................................................... [1]
...........................................................................................................................................
..................................................................................................................................... [1]
C100:2235::1000:25AA:AA50
Explain why this IPv6 address would be an invalid IPv4 address.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(b) A company has computers in two separate buildings that communicate using the Internet
over a Public Switched Telephone Network (PSTN).
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [2]
(ii) The company wants to install a dedicated line between the two buildings.
Identify one benefit and one drawback of installing a dedicated line between the two
buildings.
Benefit ...............................................................................................................................
...........................................................................................................................................
Drawback ..........................................................................................................................
...........................................................................................................................................
[2]
© UCLES 2019 9608/12/M/J/19
3
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
1 ................................................................................................................................................
2 ................................................................................................................................................
3 ................................................................................................................................................
[3]