Exclusive Practice Resource

Monday 18 May 2026 - Afternoon

GCSE (9-1) Computer Science

Unofficial Practice Paper: J277/01 Computer Systems [Version E]

Time allowed: 1 hour 30 minutes

Centre number
Candidate number
First name(s)
Last name

INSTRUCTIONS

This is an unofficial practice resource created exclusively for gcsecomputerscience.co.uk. It is not endorsed by, affiliated with, or approved by Oxford Cambridge and RSA Examinations (OCR).
Turn over
2
1

A computer system uses a Von Neumann architecture CPU.

(a) Tick (✓) one box in each row to identify whether the register is part of the CPU architecture.

Feature / ItemYesNo
Program Counter
BIOS
MAR
Secondary Storage
Accumulator
MDR
[4]

(b) Explain how increasing the number of cores can improve the performance of a CPU.

[3]

(c) Describe the role of Cache memory in the CPU.

[3]
2

A tablet computer uses both RAM and ROM.

(a) Complete the following sentences about memory using the word bank provided. Word Bank: Volatile, Non-Volatile, Temporary, Permanent, Fast, Slow RAM is __________ memory, meaning it loses its contents when power is turned off. ROM is __________ memory, and is used to store the startup instructions. RAM is much __________ than secondary storage.

[3]

(b) Explain the process of swapping data in and out of Virtual Memory when RAM is full.

[4]

(c) Justify the choice of Solid State Storage (SSD) over Magnetic storage for a portable tablet.

[3]
Turn over
3
3

The tablet connects to a Local Area Network (LAN).

(a) Identify three pieces of hardware required to connect a stand-alone computer to a LAN.

[3]

(b) Draw a diagram representing a Star topology with a switch and four workstations.

[4]

(c) Explain the role of a Router in a network.

[3]
4

The tablet uses embedded systems and utility software.

(a) Compare an Embedded System and a General-Purpose system using the tablet's camera module as an example.

[4]

(b) Describe the function of Peripheral Management and Defragmentation.

[6]
Turn over
4
5

The MedConnect system uses various protocols.

(a) Explain the difference between a MAC address and an IP address.

[4]

(b) Describe the role of the Transmission Control Protocol (TCP).

[3]

(c) Identify the correct protocol (SMTP, IMAP, or HTTPS) for these tasks: (i) Sending an email (ii) Accessing a secure database web portal (iii) Syncing emails across devices

[3]
6

Security threats and data handling.

(a) Explain how an SQL Injection attack is carried out.

[3]

(b) Describe how Social Engineering (Phishing) could target medical staff.

[3]

(c) Calculate how many Gigabytes (GB) are in 250 photos, each 4,000 Kilobytes (KB) in size. Show your working.

[4]
Turn over
5
7

(a) Identify the legislation that protects patient privacy in this scenario.

[2]

(b) * Discuss the Ethical, Legal, and Privacy issues associated with storing medical data on portable devices.

[8]
8

Network models and protection.

(a) Explain the role of a Server in a Client-Server network.

[3]

(b) Describe how Encryption and Firewalls protect the MedConnect network.

[4]

(c) Justify the use of Cloud Storage for medical backups.

[3]
Turn over