QUESTION 1.
4 (a) Three descriptions and two types of processor are shown below.
Draw a line to connect each description to the appropriate type of processor.
Description Type of processor
Makes extensive use of
RISC
general purpose registers
Many addressing modes
CISC
are available
Has a simplified set of
instructions
[3]
(b) In a RISC processor three instructions (A followed by B, followed by C) are processed using
pipelining.
The following table shows the five stages that occur when instructions are fetched and
executed.
(i) The ‘A’ in the table indicates that instruction A has been fetched in time interval 1.
Complete the table to show the time interval in which each stage of each instruction (A,
B, C) is carried out.
Time interval
Stage 1 2 3 4 5 6 7 8 9
Fetch instruction A
Decode instruction
Execute instruction
Access operand in memory
Write result to register
[3]
(ii) The completed table shows how pipelining allows instructions to be carried out more
rapidly. Each time interval represents one clock cycle.
Calculate how many clock cycles are saved by the use of pipelining in the above example.
Show your working.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[3]
© UCLES 2015 9608/31/O/N/15
QUESTION 2. 4
2 (a) The following diagram shows four descriptions and two types of processor.
Draw lines to connect each description to the appropriate type of processor.
Description Type of processor
It has a simplified set of instructions.
Emphasis is on the hardware rather
CISC
than the software.
It makes extensive use of general
RISC
purpose registers.
Many instruction formats are available.
[4]
(b) In a RISC processor, instructions are processed using pipelining.
(i) Explain what is meant by pipelining.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The following table shows the five stages that occur when instructions are fetched and
executed. The table also shows a number of time intervals.
Two instructions, D followed by E, are fetched and executed. The ‘E’ in the incomplete
table shows that instruction E has been fetched in time interval 2.
Complete each row of the table.
Time interval
Stage 1 2 3 4 5 6 7 8
Fetch instruction E
Read registers and decode instruction
Execute instruction
Access operand in memory
Write result to register
[3]
© UCLES 2017 9608/32/O/N/17
5
(c) The instruction set for a RISC processor that allows pipelining includes the following
instruction.
Instruction
Explanation
Op code Operands
Add the integers in registers op1 and op2.
ADD <dest>, <op1>, <op2>
Place the result in register dest.
A program contains the following three instructions.
ADD r3, r2, r1
ADD r5, r4, r3
ADD r10, r9, r8
(i) Explain why pipelining fails for the first two instructions.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
.......................................................................................................................................[2]
(ii) The instructions were produced by a compiler after translation of a high-level language
program.
The compiler is not capable of code optimisation.
State how the code from the compiler could have been optimised to overcome the
problem in part (c)(i).
...........................................................................................................................................
.......................................................................................................................................[1]
© UCLES 2017 9608/32/O/N/17 [Turn over
QUESTION 3. 10
(iii) State two benefits of the process that is carried out in the final stage.
Benefit 1 ............................................................................................................................
...........................................................................................................................................
Benefit 2 ............................................................................................................................
...........................................................................................................................................
[2]
(d) An interpreter is executing a program. The program uses the variables a, b, c and d.
The program contains an expression that is written in infix form. The interpreter converts the
infix expression to RPN.
The RPN expression is: b a c + * d + 2 −
The interpreter evaluates this RPN expression using a stack.
The current values are: a = 1 b = 2 c = 2 d = 3
Show the changing contents of the stack as the interpreter evaluates the expression.
The first entry on the stack has been done for you.
2
[4]
5 (a) Most desktop or laptop computers use CISC (Complex Instruction Set Computing)
architecture. Most smartphones and tablets use RISC (Reduced Instruction Set Computing).
State four features that are different for the CISC and RISC architectures.
1 ................................................................................................................................................
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
3 ................................................................................................................................................
...................................................................................................................................................
4 ................................................................................................................................................
...................................................................................................................................................
[4]
© UCLES 2018 9608/32/O/N/18
11
(b) In a RISC processor, four instructions (A, B, C, D) are processed using pipelining.
The following table shows five stages that take place when instructions are fetched and
executed. In time interval 1, instruction A has been fetched.
(i) In the table, write the instruction labels (A, B, C, D) in the correct time interval for each
stage. Each operation only takes one time interval.
Time interval
Stage
1 2 3 4 5 6 7 8 9
Fetch instruction A
Decode instruction
Execute instruction
Access operand in memory
Write result to register
[3]
(ii) When completed, the table in part (b)(i) shows how pipelining allows instructions to be
carried out more rapidly. Each time interval represents one clock cycle.
Calculate how many clock cycles are saved by using pipelining in the example in
part (b)(i).
Show your working.
Working .............................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
Answer ..............................................................................................................................
[3]
© UCLES 2018 9608/32/O/N/18 [Turn over
12
(c) The table shows four statements about computer architecture.
Put a tick (✓) in each row to identify the computer architecture associated with each statement.
Architecture
Statement
SIMD MIMD SISD
Each processor executes a different instruction
There is only one processor
Each processor executes the same instruction input
using data available in the dedicated memory
Each processor typically has its own partition within a
shared memory
[4]
6 (a) The following table shows descriptions and terms relating to data transmission security.
Add appropriate descriptions and terms to complete the table.
Description Term
The result of encryption that is transmitted to the
A
recipient. .................................
The type of cryptography used where different keys are
B
used; one for encryption and one for decryption. .................................
.........................................................................................
.........................................................................................
C Digital certificate
.........................................................................................
.........................................................................................
.........................................................................................
.........................................................................................
D Private key
.........................................................................................
.........................................................................................
[4]
© UCLES 2018 9608/32/O/N/18
QUESTION 4. 10
7 (a) RISC (Reduced Instruction Set Computing) and CISC (Complex Instruction Set Computing)
are two types of processor.
Tick (3) one box in each row to show if the statement applies to RISC or CISC processors.
Statement RISC CISC
Larger instruction set
Variable length instructions
Smaller number of instruction formats
Pipelining is easier
Microprogrammed control unit
Multi-cycle instructions
[3]
(b) In parallel processing, a computer can have multiple processors running in parallel.
(i) State the four basic computer architectures used in parallel processing.
1 ........................................................................................................................................
2 ........................................................................................................................................
3 ........................................................................................................................................
4 ........................................................................................................................................
[4]
(ii) Describe what is meant by a massively parallel computer.
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
...........................................................................................................................................
..................................................................................................................................... [3]
© UCLES 2019 9608/32/M/J/19