Exclusive Practice Resource

Monday 18 May 2026 - Afternoon

GCSE (9-1) Computer Science

Unofficial Practice Paper: J277/01 Computer Systems [VERSION D]

Time allowed: 1 hour 30 minutes

Centre number
Candidate number
First name(s)
Last name

INSTRUCTIONS

This is an unofficial practice resource created exclusively for gcsecomputerscience.co.uk. It is not endorsed by, affiliated with, or approved by Oxford Cambridge and RSA Examinations (OCR).
Turn over
2
1

(a) State the need for primary storage in a computer system.

[2]

(b) Compare the roles of the Arithmetic Logic Unit (ALU) and the Control Unit (CU) within the CPU.

[4]

(c) A video editing workstation requires high performance. Describe how Cache size and Clock speed specifically impact the performance of this workstation.

Cache size:

Clock speed:

[4]
Turn over
3
2

(a) State the formula for calculating the total number of characters that can be represented by a character set using n bits.

[2]

(b) Explain the relationship between Resolution, Colour Depth, and the final File Size of a bitmap image.

[4]

(c) Describe how sampling is used to represent an analogue sound wave digitally.

[4]
Turn over
4
3

(a) A user enters a URL into a web browser to access a website.

Describe the role of a Domain Name Server (DNS) in this process.

[2]

(b) A small home office has three computers. Justify the use of a Peer-to-Peer network rather than a Client-Server network for this office.

[4]

(c) Describe the role of a Network Interface Controller (NIC) and a Wireless Access Point (WAP) in a local area network.

NIC:

WAP:

[4]
5
4

(a) Compare Phishing and Brute-force attacks as threats to network security.

[4]

(b) Describe how Penetration Testing is used to identify vulnerabilities in a network.

[4]

(c) Identify one human error that can lead to a security breach, and one technical method to prevent that error from being exploited.

Human Error:

Prevention Method:

[2]
Turn over
6

SECTION B

Context: Heritage Hub (Digital Museum Project)

A local museum, "Heritage Hub", is digitising its archives and installing touchscreen kiosks for visitors.

5

(a) The museum's touchscreen kiosks require specialised software. Describe the Peripheral Management function of the operating system in this scenario.

[4]

(b) Explain how the museum can use Encryption and Compression utilities to manage its digital archives.

Encryption:

Compression:

[6]
7
6

(a) Compare the use of Open Source software and Proprietary software for the museum's new website. Refer to cost, support, and customisation.

[6]

(b) Identify which law applies to the following scenarios. You must use the full name of the Act.

(i) An employee at the museum makes unauthorized copies of copyrighted multimedia software for personal use.

Law:

(ii) A hacker uses a script to gain unauthorised access to the museum's donor database to steal personal information.

Law:

[4]
Turn over
8
7

(a) Each kiosk is connected to the museum network.

Explain the difference between a MAC address and an IP address in terms of their purpose and their permanence.

[4]

(b)* "Heritage Hub is digitising its entire collection. This will make rare artifacts available to anyone in the world for free via the internet, but it may lead to the physical museum losing visitors and funding."

Discuss the Cultural and Environmental impacts of this digital shift. Your answer should consider stakeholders, the digital divide, and the energy consumption of data centers.

[8]
9
8

(a) Explain the concept of layers in the TCP/IP network model.

[4]

(b) Assign the most suitable email protocol (POP, IMAP, or SMTP) to the following tasks:

TaskProtocol
Sending an automated alert email from a kiosk to the manager.
Retrieving an email and deleting it from the server permanently.
Syncing a staff member's inbox across their laptop and phone.
[4]
END OF QUESTION PAPER