Computer Science Paper 3 Theory 2025
Computer Science Paper 3 Theory 2025
, ,
¬O. 4mHuOªE]{5W
¬Dn|Z¥¦S;]DEq
¥E¥55e5¥¥ EUUU
* 6 0 0 5 3 5 2 7 4 2 *
1 hour 30 minutes
INSTRUCTIONS
● Answer all questions.
● Use a black or dark blue pen.
● Write your name, centre number and candidate number in the boxes at the top of the page.
● Write your answer to each question in the space provided.
● Do not use an erasable pen or correction fluid.
● Do not write on any bar codes.
● You may use an HB pencil for any diagrams, graphs or rough working.
● Calculators must not be used in this paper.
INFORMATION
● The total mark for this paper is 75.
● The number of marks for each question or part question is shown in brackets [ ].
● No marks will be awarded for using brand names of software packages or hardware.
DC (DE/CT) 342251/3
© UCLES 2025 [Turn over
* 0000800000002 *
1 A programmer is writing a program to manage bookings for a small taxi company. The programmer
requires some user-defined data types.
(a) Write a pseudocode statement to declare the enumerated data type, Vehicle, to hold the
identity code of each of the company’s taxis:
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
ĬÍĊ®Ġ´íÈõÏĪÅĊàù·þ×
© UCLES 2025 ĬÄðûÛġĢøìùñØĕºõÉĘĂ
ĥĕõĕõÕĥÕÕÕµÅąÕåĕõÕ
9618/31/M/J/25
* 0000800000003 *
DO NOT WRITE IN THIS MARGIN
3
, ,
(a) Write the normalised floating-point representation of the following binary number using this
system.
0.00000011010111
DO NOT WRITE IN THIS MARGIN
Mantissa Exponent
[2]
(b) Calculate the normalised binary floating-point representation of –25.3125 in this system.
Show your working.
Mantissa Exponent
DO NOT WRITE IN THIS MARGIN
Working .....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
DO NOT WRITE IN THIS MARGIN
ĬÏĊ®Ġ´íÈõÏĪÅĊàû·þ×
© UCLES 2025 ĬÄïüÓħĞĈÍÿĀđÁÂáÉĨĂ
ĥĕąÕµµąµÅåĥÅąµÅÕĥÕ
9618/31/M/J/25 [Turn over
* 0000800000004 *
3 (a) The Application Layer and Transport Layer are two layers of the TCP/IP protocol suite.
Describe the purpose of the Application Layer and the purpose of the Transport Layer.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
(b) Describe packet switching as a method of transmitting messages across the internet.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [4]
DO NOT WRITE IN THIS MARGIN
ĬÍĊ®Ġ´íÈõÏĪÅĊÞù·Ā×
© UCLES 2025 ĬÄïùÓĝĐāêāćĚģĞăÙĐĂ
ĥåÕÕõµąĕåąĕÅŵĥÕõÕ
9618/31/M/J/25
* 0000800000005 *
DO NOT WRITE IN THIS MARGIN
5
, ,
4 (a) A linked list of nodes is used to store an ordered list of integers. Each node consists of the
data, a left pointer and a right pointer, for example:
Complete the binary tree, including null pointers, to show how the data will be organised after
the following integers have been added:
6, 15, 41, 66
Root pointer
DO NOT WRITE IN THIS MARGIN
36
12 40
–1 3
DO NOT WRITE IN THIS MARGIN
[4]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
ĬÏĊ®Ġ´íÈõÏĪÅĊÞû·Ā×
© UCLES 2025 ĬÄðúÛīĔñÏ÷úÏ·Ė×ÙĠĂ
ĥååĕµÕĥõµõÅÅÅÕąĕĥÕ
9618/31/M/J/25 [Turn over
* 0000800000006 *
(c) A binary tree is a suitable Abstract Data Type (ADT) that a designer can implement using
recursive algorithms.
Identify one other ADT that a designer can implement using recursive algorithms.
............................................................................................................................................. [1]
(a) Write the Boolean logic expression that corresponds to the given truth table as the
sum-of-products.
Z = ............................................................................................................................................
............................................................................................................................................. [2]
DO NOT WRITE IN THIS MARGIN
ĬÑĊ®Ġ´íÈõÏĪÅĊßû¶þ×
© UCLES 2025 ĬÄïúØġüû×ôċæ×жñĐĂ
ĥõąĕµõĥÕõĕĥÅąÕåÕµÕ
9618/31/M/J/25
* 0000800000007 *
DO NOT WRITE IN THIS MARGIN
7
, ,
(b) (i) Complete the Karnaugh map (K-map) for the given truth table.
AB
CD 00 01 11 10
00
01
DO NOT WRITE IN THIS MARGIN
11
10
[2]
(ii) Draw loop(s) around appropriate group(s) in the K-map to produce an optimal
sum-of-products. [2]
(iii) Write the Boolean logic expression from your answer to part (b)(ii) as the simplified
sum-of-products.
DO NOT WRITE IN THIS MARGIN
Z = .....................................................................................................................................
..................................................................................................................................... [2]
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
..........................................................................................................................................................
.................................................................................................................................................... [4]
DO NOT WRITE IN THIS MARGIN
ĬÓĊ®Ġ´íÈõÏĪÅĊßù¶þ×
© UCLES 2025 ĬÄðùÐħøċâĆöģăĖĢñĠĂ
ĥõõÕõĕąµĥĥµÅąµÅĕåÕ
9618/31/M/J/25 [Turn over
* 0000800000008 *
uppercase lowercase
A b
C d
E f
J k
symbol digit
$ 0
@ 1
& 3
% 4
9
lowercase
DO NOT WRITE IN THIS MARGIN
passcode
uppercase symbol
digit
ĬÑĊ®Ġ´íÈõÏĪÅĊÝû¶Ā×
© UCLES 2025 ĬÄðüÐĝĆþÕČíĬáºÄġĘĂ
ĥÅåÕµĕąĕąÅÅÅŵĥĕµÕ
9618/31/M/J/25
* 0000800000009 *
DO NOT WRITE IN THIS MARGIN
9
, ,
(a) State why each passcode is invalid for the given syntax diagrams.
#Jd7
Reason .....................................................................................................................................
...................................................................................................................................................
C%6A
Reason .....................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
[2]
(b) Complete the Backus-Naur Form (BNF) for <uppercase> and <passcode>.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
[4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÓĊ®Ġ´íÈõÏĪÅĊÝù¶Ā×
© UCLES 2025 ĬÄïûØīĊîäîĄÝõÂĘġĨĂ
ĥÅÕĕõõĥõĕµĕÅÅÕąÕåÕ
9618/31/M/J/25 [Turn over
* 0000800000010 *
8 (a) Describe what is meant by multi-tasking and how it benefits process management.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
Function ....................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
Benefit ......................................................................................................................................
...................................................................................................................................................
[4]
9 Secure Socket Layer (SSL) and Transport Layer Security (TLS) are two protocols.
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
(b) Give two examples of situations where the use of SSL/TLS would be appropriate.
1 ................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
2 ................................................................................................................................................
...................................................................................................................................................
[2]
ĬÑĊ®Ġ´íÈõÏĪÅĊàû¸þ×
© UCLES 2025 ĬÄíüÕğþĜÛăö½¼èÙĠĂ
ĥĕÅĕµĕåĕåõÅąÅĕĥĕąÕ
9618/31/M/J/25
* 0000800000011 *
DO NOT WRITE IN THIS MARGIN
11
, ,
10 (a) Describe the purpose of a graph when used in an Artificial Intelligence (AI) system.
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
............................................................................................................................................. [2]
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
...................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...................................................................................................................................................
............................................................................................................................................. [4]
DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN
ĬÓĊ®Ġ´íÈõÏĪÅĊàù¸þ×
© UCLES 2025 ĬÄîûÍĩĂĬÞõċćęÄôÙĐĂ
ĥĕµÕõõÅõµąĕąÅõąÕĕÕ
9618/31/M/J/25 [Turn over
* 0000800000012 *
11 (a) A medical centre uses objects of the class Appointment to record treatments given and
medication prescribed during each doctor’s appointment. Some of the attributes required in
the class are listed in the table.
Appointment
.......................................................... : .............................................................................
.......................................................... : .............................................................................
Treatments : STRING
Medications : STRING
............................................................................................................................................
SetDoctor(DoctorID : STRING)
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
............................................................................................................................................
DO NOT WRITE IN THIS MARGIN
............................................................................................................................................
GetTreatments()
GetMedications()
[5]
ĬÑĊ®Ġ´íÈõÏĪÅĊÞû¸Ā×
© UCLES 2025 ĬÄîúÍģôĝÙûĄĀ»ĠÒÉĨĂ
ĥåĥÕµõÅÕÕåĥąąõåÕąÕ
9618/31/M/J/25
* 0000800000013 *
DO NOT WRITE IN THIS MARGIN
13
, ,
(b) (i) Identify the object-oriented programming (OOP) feature whose function includes
restricting external access to the data.
..................................................................................................................................... [1]
...........................................................................................................................................
...........................................................................................................................................
DO NOT WRITE IN THIS MARGIN
...........................................................................................................................................
..................................................................................................................................... [2]
12 The pseudocode algorithm checks whether a location in a stock file [Link] is empty
or not. The location is given by the user. If the location is empty, a suitable message is displayed,
otherwise the item stored at that location is displayed.
OPENFILE .......................................................................................................................................
WHILE Continue
OUTPUT "Enter a location between 1 and 500: "
INPUT Location
....................................................................................................................................................
GETRECORD ..............................................................................................................................
DO NOT WRITE IN THIS MARGIN
..........................................................................................................................................................
DO NOT WRITE IN THIS MARGIN
ĬÓĊ®Ġ´íÈõÏĪÅĊÞù¸Ā×
© UCLES 2025 ĬÄíùÕĥðčàýíÉğĘĆÉĘĂ
ĥåĕĕõĕåµÅÕµąąĕÅĕĕÕ
9618/31/M/J/25
© UCLES 2025
,
* 0000800000014 *
ĥąĕÕµõĥĕåŵÅÅÕĥÕÅÕ
ĬÄîûØīăĥÎċúĦýĂùĐĂ
ĬÍĊ®Ġ´íÈõÏĪÅĊÝúµĂ×
,
14
9618/31/M/J/25
BLANK PAGE
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN
DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN DO NOT WRITE IN THIS MARGIN
© UCLES 2025
,
* 0000800000015 *
ĥąĥĕõĕąõµµĥÅŵąĕÕÕ
ĬÄíüÐĝÿĕëíćãėµÖùĠĂ
ĬÏĊ®Ġ´íÈõÏĪÅĊÝüµĂ×
,
15
9618/31/M/J/25
BLANK PAGE
* 0000800000016 *
BLANK PAGE
Permission to reproduce items where third-party owned material protected by copyright is included has been sought and cleared where possible. Every
reasonable effort has been made by the publisher (UCLES) to trace copyright holders, but if any items requiring clearance have unwittingly been included, the
publisher will be pleased to make amends at the earliest possible opportunity.
To avoid the issue of disclosure of answer-related information to candidates, all copyright acknowledgements are reproduced online in the Cambridge
Assessment International Education Copyright Acknowledgements Booklet. This is produced for each series of examinations and is freely available to download
at [Link] after the live examination series.
Cambridge Assessment International Education is part of Cambridge Assessment. Cambridge Assessment is the brand name of the University of Cambridge
Local Examinations Syndicate (UCLES), which is a department of the University of Cambridge.
ĬÍĊ®Ġ´íÈõÏĪÅĊßúµĄ×
© UCLES 2025 ĬÄíùÐħíĔÐóĀìµęøĩĘĂ
ĥµµĕµĕąÕÕĕĕÅąµåĕÅÕ
9618/31/M/J/25