0% found this document useful (0 votes)
56 views12 pages

Sample QP - Paper 1 OCR Computer Science GCSE

This document is a sample question paper for the GCSE (9–1) Computer Science exam, specifically for the J276/01 Computer Systems paper. It includes instructions for candidates, various questions related to computer systems, memory, network protocols, and data security, along with spaces for answers. The paper is designed to assess students' understanding of key concepts in computer science over a duration of 1 hour and 30 minutes.

Uploaded by

mzohaibgeo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views12 pages

Sample QP - Paper 1 OCR Computer Science GCSE

This document is a sample question paper for the GCSE (9–1) Computer Science exam, specifically for the J276/01 Computer Systems paper. It includes instructions for candidates, various questions related to computer systems, memory, network protocols, and data security, along with spaces for answers. The paper is designed to assess students' understanding of key concepts in computer science over a duration of 1 hour and 30 minutes.

Uploaded by

mzohaibgeo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

PMT

GCSE (9–1) Computer Science


J276/01 Computer Systems
Sample Question Paper

Date – Morning/Afternoon
Time allowed: 1 hour 30 minutes

You may not use:


• a calculator

en * 0 0 0 0 0 0 *
im
First name
ec

Last name

Centre Candidate
number number
Sp

INSTRUCTIONS
• Use black ink.
• Complete the boxes above with your name, centre number and candidate
number.
• Answer all the questions.
• Write your answer to each question in the space provided.
• If additional space is required, use the lined page(s) at the end of this
booklet. The question number(s) must be clearly shown.
• Do not write in the bar codes.

INFORMATION
• The total mark for this paper is 80.
• The marks for each question are shown in brackets [ ].
• Quality of extended responses will be assessed in this paper in questions
marked with an *.
• This document consists of 12 pages.

© OCR 2015 J276/01 Turn over


[…/…/…] DC (…) R10048/19
PMT

1 Ann wants to purchase a new computer and is looking at two models. The specification of the
CPU in each computer is shown in Fig. 1.

Fig. 1

Computer 1 Computer 2

Clock Speed: 1 GHz Clock Speed: 1.4 GHz

Cache size: 2 MB Cache size: 2 MB

Number of Cores: 4 Number of Cores: 2

(a) When running a 3D flight simulator, Computer 1 is likely to run faster than Computer 2.

Using the information in Fig. 1, identify one reason for this.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

en [1]

(b) Identify two internal components that are not in Fig. 1, which could improve the performance
im
of the computers.

………………………………………………………………………………………………………………..
ec

………………………………………………………………………………………………………………..

[2]

(c) Explain one reason why the cache size affects the performance of the CPU.
Sp

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[2]

(d) Identify four events that take place during the fetch-execute cycle.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[4]

© OCR 2015 J276/01


PMT

2 Vicky has been on holiday and has taken lots of photos. The memory in her camera is now full and
she needs to transfer her photos to an external secondary storage device.

(a) Define what is meant by ‘secondary storage’.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[1]

(b) Identify the three common storage technologies Vicky can choose from.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[3]

(c) State four characteristics of secondary storage devices that Vicky should consider when
choosing a device.

………………………………………………………………………………………………………………..
en
im
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
ec

[4]
Sp

3 Gareth has a satellite navigation system (Sat Nav) in his car that uses RAM and ROM.

(a) Fig. 2 lists some characteristics of computer memory. Tick () one box in each row to show
whether each of the statements is true for the RAM or ROM in Gareth’s Sat Nav.

Fig. 2

RAM ROM
Stores the boot up
sequence of the
Sat Nav.
The contents are
lost when the Sat
Nav is turned off.
Holds copies of
open maps and
routes.

[3]
© OCR 2015 J276/01 Turn over
PMT

(b) Gareth’s Sat Nav contains an embedded system. Define what is meant by an ‘embedded
system’.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[1]

(c) Identify three devices, other than a Sat Nav, that contain embedded systems.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[3]

4
en
Bill needs to send a document across a network to Ben. Write an algorithm to show how packets
are used to send the document, starting from when Bill clicks send (sending), and finishing when
Ben reads the document (receiving).
im
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
ec

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
Sp

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[6]

© OCR 2015 J276/01


PMT

5 The owners of a large bakery have a Local Area Network (LAN) with a star topology. They order
their supplies over the Internet. When data is transmitted from the bakery to the supplier, network
protocols are used.

(a) Define what is meant by a ‘network protocol’.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[1]

(b) TCP/IP is a set of protocols based on layers.

(i) With regards to network protocols, define what is meant by a ‘layer’.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[1]

en
(ii) Describe one advantage of using layers to construct network protocols.

………………………………………………………………………………………………………………..
im
………………………………………………………………………………………………………………..

[2]

(c) Explain four reasons why the bakery may use a star network topology for their LAN.
ec

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
Sp

[4]

6 A doctor’s surgery stores hundreds of patients’ details on its computer network. The surgery is
concerned about the security of its patients’ sensitive medical data.

(a) Staff are already required to use strong passwords to protect systems. Explain, with reference
to system security, three other ways that the surgery could protect the system.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

© OCR 2015 J276/01


PMT

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[6]

(b) Identify three errors that the surgery’s staff could make, that may endanger the security of the
network and outline a procedure that could be put in place to prevent each error.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

en
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
im
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
ec

[6]
Sp

7 A restaurant has a computer-based ordering system which is running slowly. A technician has
said that the hard disc drive is fragmented. The technician has suggested using utility software to
defragment the drive.

(a) Explain how the restaurant’s hard disc could have become fragmented.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[4]

© OCR 2015 J276/01 Turn over


PMT

(b) Explain how defragmentation software could overcome the issue of the slow computer system.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

[3]

en
im
ec
Sp

© OCR 2015 J276/01


PMT

8 A law firm currently use a Local Area Network (LAN) linked to a Wide Area Network (WAN). They
want to upgrade their system to utilise cloud storage.
(a) Define what is meant by a Wide Area Network.

………………………………………………………………………………………………………………..

[1]

(b) Explain two advantages to the law firm of storing their data in the cloud.

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

en
(c) Explain two disadvantages to the law firm of storing their data in the cloud.
[4]
im
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
ec

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
Sp

………………………………………………………………………………………………………………..

[4]

© OCR 2015 J276/01 Turn over


PMT

(d) Fig. 3 lists some actions that may take place in the law firm’s office. Tick () one box in each row
to show which legislation applies to each action.
Fig. 3

Data Computer Copyright


Protection Act Misuse Act Designs and
Action
1998 1990 Patents Act 1988
Using a picture for the
law firm’s new logo
without the original
creators permission.

A secretary accessing
a lawyer’s personal
email account without
permission.

Making a copy of the


latest Hollywood
blockbuster movie and
sharing it with a client.

Storing customer data


insecurely. en
im
A lawyer installing a
key logger on the
secretary’s computer.
ec

Selling clients
personal legal data to
a marketing company
without their
permission.
Sp

[6]

9* Even though the computer devices they own still work, people often want to buy the most up-to-
date models, such as the latest smartphone.

Discuss the impact of people wanting to upgrade to the latest smartphone.

In your answer you might consider the impact on:

 stakeholders
 technology
 ethical issues
 environmental issues

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

© OCR 2015 J276/01 Turn over


PMT

10

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..

en
………………………………………………………………………………………………………………..

………………………………………………………………………………………………………………..
im
[8]
ec
Sp

© OCR 2015 J276/01


PMT

11

BLANK PAGE

en
im
ec
Sp

© OCR 2015 J276/01


PMT

12

en
im
ec
Sp

Copyright Information:

OCR is committed to seeking permission to reproduce all third-party content that it uses in the assessment materials. OCR has attempted to
identify and contact all copyright holders whose work is used in this paper. To avoid the issue of disclosure of answer-related information to
candidates, all copyright acknowledgements are reproduced in the OCR Copyright Acknowledgements booklet. This is produced for each
series of examinations and is freely available to download from our public website (www.ocr.org.uk) after the live examination series.

If OCR has unwittingly failed to correctly acknowledge or clear any third-party content in this assessment material, OCR will be happy to correct
its mistake at the earliest possible opportunity.

For queries or further information please contact the Copyright Team, First Floor, 9 Hills Road, Cambridge CB2 1GE.

OCR is part of the Cambridge Assessment Group; Cambridge Assessment is the brand name of University of Cambridge Local Examinations
Syndicate (UCLES), which is itself a department of the University of Cambridge.

© OCR 2015 J276/01

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy