OCR J277 Master Specification

The definitive, fully detailed reverse-engineered guide based on exam reality.

1.1 Architecture of the CPU

1.1.1 Architecture of the CPU

Students must understand the purpose of the CPU, the specific stages of the Fetch-Execute cycle, and the exact roles of its internal components and registers.

The Purpose of the CPU:

The Fetch-Decode-Execute (FDE) Cycle:

CPU Components and Their Functions:

Von Neumann Architecture (Registers):

The Golden Rule: Students must explicitly understand the difference between a register that stores an address (a location in memory) and a register that stores data (the actual binary instructions or values).

1.1.2 CPU Performance

Students must be able to explain how the following characteristics affect the performance of a computer system, both individually and in combination (e.g., comparing two different processors in an exam scenario).

1.1.3 Embedded Systems

Students must be able to identify embedded systems, justify their choices, and contrast them with general-purpose computers (like laptops and tablets).

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

To secure top marks, students must avoid these common pitfalls seen in past papers:

❌ Explicitly Not Required (Do Not Teach/Revise)

1.2 Memory and Storage

1.2.1 Primary Storage (Memory)

Students must clearly distinguish between the different types of memory, their volatility, and their exact purpose in the computer system.

The Need for Primary Storage:

Primary storage is memory that can be accessed directly and quickly by the CPU. It is required to hold data and instructions that the CPU needs to access immediately.

1.2.2 Secondary Storage

Students must evaluate storage media using six specific characteristics and recommend the correct device for a given scenario.

The Need for Secondary Storage:

To store data, files, the operating system, and software permanently (non-volatile). Without it, all data would be lost when the computer is turned off.

Storage Technologies:

The Six Evaluation Characteristics:

Students must memorise and use these exact terms when comparing devices: Capacity, Speed, Portability, Durability, Reliability, and Cost.

1.2.3 Units & Data Capacity Calculations

Students must be able to convert between units and calculate file sizes. Examiners explicitly accept and prefer using Base-10 multiples of 1,000 for all calculations.

1.2.4 Data Representation

Students must understand how numbers, characters, images, and sound are converted into binary.

Numbers and Logic

Characters

Images

Sound

1.2.5 Compression

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

1.3 Computer Networks, Connections and Protocols

1.3.1 Networks and Topologies

Students must be able to define network types, compare network models, evaluate topologies, and identify specific hardware functions.

Types of Network:

Network Performance Factors:

Network Roles (Models):

Hardware for a LAN:

The Internet, DNS, and The Cloud:

Topologies:

1.3.2 Wired and Wireless Networks, Protocols and Layers

Students must understand how data travels securely, the rules governing it, and the difference between physical and logical addresses.

Modes of Connection:

Encryption:

The process of scrambling data into an unreadable format using a key. Protects data during transmission so intercepted data is meaningless without the decryption key.

IP Addressing and MAC Addressing:

Standards:

Provide rules for areas of computing. They allow hardware and software from different manufacturers to interact and be compatible (interoperability).

Common Protocols:

Definition: A set of rules for data transfer. Different protocols have different purposes.

The Concept of Layers:

Dividing the complex task of networking into smaller, manageable, distinct sections.

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

1.4 Network Security

1.4.1 Threats to Computer Systems and Networks

Students must know how the following attacks are carried out and the specific purpose of the attack:

1.4.2 Identifying and Preventing Vulnerabilities

Students must know what the following methods prevent and exactly how they work:

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

1.5 Systems Software

1.5.1 Operating Systems

Students must understand that the OS provides a platform for software to run, manages hardware, and provides a user interface.

1.5.2 Utility Software

Students must understand that computers include built-in utility software that supports the OS by performing system maintenance and "housekeeping" tasks.

❌ Explicitly Not Required (Do Not Teach/Revise)

1.6 Ethical, Legal, Cultural and Environmental Impacts

1.6.1 The Impacts of Digital Technology on Society

Students must be able to discuss the impacts of technology by weighing up both the benefits and drawbacks for specific stakeholders (e.g. the company vs the customer, the individual vs society). Examiners frequently test these through specific scenarios: Artificial Intelligence replacing human jobs, the rollout of rural internet, Bring Your Own Device (BYOD) in schools, and the use of facial recognition/CCTV.

1.6.2 Legislation Relevant to Computer Science

Students must be able to identify which law applies to a given scenario and state the specific, actionable steps a company must take to comply.

1.6.3 Software Licences

🛑 Examiner's Eye: High-Grade Exam Technique (The 8-Mark Essay)

❌ Explicitly Not Required (Do Not Teach/Revise)

2.1 Algorithms

2.1.1 Computational Thinking

2.1.2 Designing, Creating and Refining Algorithms

2.1.3 Searching and Sorting Algorithms

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

2.2 Programming Fundamentals

2.2.1 Core Programming Concepts

2.2.2 Data Types

2.2.3 Additional Programming Techniques

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

2.3 Producing Robust Programmes

2.3.1 Defensive Design

2.3.2 Testing

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

2.4 Computational Logic

2.4.1 Boolean Logic

Students must be able to translate seamlessly between four different formats: real-world scenarios, logic circuit diagrams, Boolean expressions, and truth tables.

The Core Logic Gates:

Students must memorise the standard shapes, functions, and alternate terminology of the three core logic gates:

Truth Tables:

A table that lists all possible binary input combinations and the resulting output.

Combining Operators & Boolean Expressions:

Writing out logic using standard text.

Alternative Notation:

Examiners will accept variations in notation. Students may use 1 and 0, or True and False. They may also use mathematical notation (e.g., V for OR, ^ for AND, or ¬ for NOT), though plain English words are safer.

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)

2.5 Programming Languages and IDEs

2.5.1 Languages and Translators

Students must be able to compare high-level and low-level languages, and evaluate the specific use cases for compilers versus interpreters.

High-Level Languages (e.g., Python, Java, C#):

Low-Level Languages (Machine Code):

The Purpose of Translators:

To convert high-level source code into machine code (binary) so the CPU can process and execute it. It also identifies syntax errors during this process.

Compilers vs Interpreters:

2.5.2 Integrated Development Environments (IDEs)

Students must know the four core tools provided by an IDE and exactly how they help a developer write maintainable code.

🛑 Examiner's Eye: High-Grade Exam Technique (Avoid the Traps!)

❌ Explicitly Not Required (Do Not Teach/Revise)