Preview

9608 y15 sm 1

Satisfactory Essays
Open Document
Open Document
1109 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
9608 y15 sm 1
www.OnlineExamHelp.com

co m Cambridge International Examinations
Cambridge International Advanced Level

COMPUTER SCIENCE

9608/01

For Examination from 2015

Paper 1 Theory Fundamentals

1 hour 30 minutes

nlin

eE

xa

mH

elp
.

SPECIMEN MARK SCHEME

ww
w.O

MAXIMUM MARK: 75

This document consists of 7 printed pages and 1 blank page.
[Turn over

© UCLES 2012

www.OnlineExamHelp.com

2
1

(a) (i) The table/each student has a repeated group of attributes. // Each student has a number of subjects.
[1]
(ii) StudentName, TutorGroup and Tutor would need to be repeated for each record.

(b)
Table: Student
StudentName TutorGroup
Tom
Joe
Samir

6
7
6

Tutor
SAN
MEB
SAN

Table: StudentSubjectChoices
Student
Subject
Name
Tom
Physics
Tom
Chemistry
Tom
General Studies
Joe
Geography
Joe
French
Samir
Computer Science
Samir
Chemistry
Samir
Maths
Samir
General Studies

Level
A
A
AS
AS
AS
A
A
A
A

Mark as follows: complete Student table repetition of StudentName in StudentSubjectChoices table complete columns 2, 3, and 4

[1]

Subject
Teacher
SAN
MEB
DIL
ROG
HEN
VAR
MEB
COR
DIL
[1]
[1]
[1]

(c) (i) primary key...
- an attribute/combination of attributes
- chosen to ensure that the records in a table are unique // used to identify a record/tuple
[2]
(ii) StudentName + Subject (This is the only correct answer.)
(iii) -

[1]

There is a one-to-many relationship. // Student is the ‘one side’ table –
StudentSubjectChoices is the ‘many side’ table. the primary key (attribute StudentName) in Student links to StudentName in the StudentSubjectChoices table
(StudentName in the) StudentSubjectChoices table is the foreign key. //
StudentName is the foreign key that links the two tables.
[max 2]

(d) -

there are non-key attributes ...
SubjectTeacher ... dependent only on part of the primary key (i.e. Subject) // partial dependency

(e) -

there are dependent non-key attributes // there are non-key dependencies
TutorGroup is dependent on Tutor // Tutor is dependent on TutorGroup

[max 2]

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Acct553Hw1

    • 455 Words
    • 2 Pages

    36. Compute Stanley's taxable income for 2012, assuming he has $1,000 in wages from working in a grocery store and $2,000 in interest income from some bonds he owns. Stanley, age 16, is claimed as a dependent on his parents' return.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430 U2G1

    • 433 Words
    • 2 Pages

    Which of the following is a difference between Telnet and SSH as supported by a…

    • 433 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Answer: The /W switch specifies the warning level of the MIDL compiler. The warning level indicates the severity of the warning. /W Specifies the warning level, an integer in the range 0 through 4. There is no space between the /W switch and the digit indicating the warning-level value. Warning levels range from 1 to 4, with a value of zero meaning to display no warning information. The highest-severity warning is level 1. The following table describes the warnings for each warning level…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    4. (TCO 2) A field or set of fields used to uniquely identify a record in a table is (Points : 4)…

    • 368 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580

    • 274 Words
    • 2 Pages

    A way to fix this problem would of vulnerability, we should have to receive a patch from Microsoft. This could take a few days due to shipping. Once we have acquired the patch, we will have to operate by downloading and run a diagnosis on the patch. Once we are a hundred percent sure that the patch will work and not cause further damage, we will begin to fix the security breach on the SMB server. The next step will to install patch to the rest of the servers and to client computers. The work could take a couple of days, but with the leadership and right deligations, this matter should get resolved smoothly.…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    A bash script is a file containing a list of commands to be executed by the bash shell. Bash scripts have many uses that they can be used for. For example, you could write a simple bash script that will change the background color on your screen. Also with bash scripts, you can run them when you want to. They don’t have to be run right away, you have the freedom to do it when you want to.…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1430

    • 1192 Words
    • 5 Pages

    The directory and file structure is not indexed, so searching within a directory with a large amount of files can be time consuming.…

    • 1192 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    3. Consider a table of data about employees. Which of the following fields are keys? Which one would you choose as the primary key? Employee ID Why? Because it is a unique number assigned to each employee.…

    • 421 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    b) 10 Convert the one table in the previous question to a relational database design. Fill each table in your…

    • 1445 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Psy7220-u04a1

    • 1013 Words
    • 3 Pages

    For this course project the child I chose to analyze is Jeremiah Wilson, he is a strong, bright African American boy. His parents are married and belong to the middle class in the economic status. His father is a Marine who deploys overseas frequently, his mother works long hours and it is difficult for her to help Jeremiah with his homework and involve him in extracurricular activities that will benefit his strong athletic personality. He has one sister who is two years old. The family resides in an urban setting , in a safe neighborhood where children are often playing outside. An aunt cares for bot Jeremiah and his sister after school hours.…

    • 1013 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Name and Example Output

    • 492 Words
    • 2 Pages

    1) Display the the name of each student and what zipcode they live in. sort them by last and then first name in ascending order…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CU1549

    • 715 Words
    • 2 Pages

    There are lots of different relationships a child has parents, siblings and extended family are the main relationships but there are a wider range of relationships that children have which include, playschool workers, their friends, doctors, dentists and people their meet on a regular basis.…

    • 715 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Records are used as a standardisation tool and will be employed when benchmarking, it also ensures that everyone has the same opportunities,…

    • 2265 Words
    • 10 Pages
    Powerful Essays