Revision Pack Form PB 2023
Revision Pack Form PB 2023
Revision Booklet
OCR J277
Paper 1 – Computer Systems: Friday 19th May pm
Page 1 of 37
Paper 1 – Computer Systems
Page 2 of 37
1. State the purpose of the CPU. [2]
2. State the name of the component that performs calculations and decisions. [1]
3. The program counter and accumulator are examples of what components of a CPU? [1]
Page 3 of 37
7. State an example of an embedded system and explain why it is a computer system. [2]
8. Explain the purpose of the program counter, and how its value changes. [2]
End of test
Total 20 marks
Page 4 of 37
Page 5 of 37
1. State the purpose of the ROM in a typical desktop computer. [1]
6. Using a suitable example, explain the need for primary storage. [4]
7. State why a cartridge for a portable entertainment games system could be ROM. [1]
8. State one reason why a portable entertainment games system needs some RAM. [1]
Page 6 of 37
10. State four characteristics that should be considered when choosing secondary storage devices for a given
application. [4]
11. A flying hobby drone is to be fitted with a gimbal and camera. State two reasons why solid state storage is a
suitable choice, and one reason why a hard disk would be unsuitable for this application.
[3]
13. Put the following devices in order of capacity, lowest to highest: DVD-R, CD-R, Blu-Ray™. [1]
14. Evaluate the merits of a hard disk drive or a solid state drive to use as the secondary storage in a laptop
computer. [6]
2. State the denary number 24 in binary. Show your answer in 8 bits. [2]
3. Show how the addition of the denary numbers 30 and 20 is performed in binary. [4]
4. Explain how an overflow occurs when adding two 8 bit binary numbers. [2]
5. Show the result of a 1 bit binary left shift on the number: 00101100 [1]
Page 8 of 37
6. Convert the denary number 128 to hexadecimal. Show your working. [2]
8.
Show the result of a 2 bit binary right shift on the number: 00110100 [1]
9. Convert the binary number 11111101 into hexadecimal and provide its denary equivalent. Show your working.
[3]
10. Braille characters are represented using six dot positions arranged in a rectangle. Each position may contain
either a raised dot or not. This is an example of a 6-bit character set. State how many characters can be stored
in this character set. [1]
End of test
Total 20 marks
Page 9 of 37
1. James is a graphic designer. He has created an icon set of 20 icons for a project. The icons are
uncompressed images of 96x96 pixels in 8-bit colour. Explain how the approximate file size can be
calculated for the icon set. [3]
2. State how many different colours can be stored using 8-bit colour. [1]
3. James has also created a video clip to promote his work which is uploaded to a popular video streaming
service. MP4 compression is used to store the video clip on the hard disk of the server. State what is meant
by the term “compression”. [1]
5. State one potential disadvantage to the user of the streaming service using compression.
[1]
6. Explain why an online software distributor cannot use the same type of compression as the video streaming
service. [4]
Page 10 of 37
7. When a video clip is created, sound is sampled from a microphone. Describe what is meant by the term,
“sound sampling”. [2]
End of test
Total 20 marks
Page 11 of 37
Page 12 of 37
Page 13 of 37
1. Identify the two networks shown. [2]
2. Using the names of the networks identified, complete the table below. [2]
Description Type of network
3. State another form of common wireless technology other than Wi-Fi. [1]
4. It is discovered that the connection to the router for one of the devices on the wireless network is
unreliable. Other than a hardware fault, state two possible causes for this. [2]
Page 14 of 37
7. Describe the purpose of the protocols: POP, IMAP, and SMTP. [3]
9. State two advantages of wired networks and two advantages of wireless networks. [4]
10. State the relationship between servers and clients, provide an example. [2]
2. Describe one advantage and one disadvantages of a local area network over stand-alone computers.
[2]
Page 15 of 37
4. Describe what is meant by a client-server model for a local area network. [3]
8. State one advantage of using fibre optic cable instead of twisted copper cable. [1]
10. Explain how the URL: www.bbc.co.uk gets resolved to an IP address. [2]
End of test
Total 20 marks
Page 16 of 37
Page 17 of 37
1. State a type of malware. [1]
4. People are often regarded as the ‘weak point’ in secure systems. Explain what is meant by this term.
[8]
5. John has had a message pop-up on his computer asking him to pay $800 to have his files decrypted. He has
looked at his file store, and his filenames have been changed. State two ways this could have happened.
[2]
6. Describe how could John have protected himself against this attack. [2]
Page 18 of 37
7. Explain what is meant by the term ‘denial of service attack’. [2]
Q9. Parveen's computer experiences a brute force attack. Fortunately, it failed because she had a strong password.
(a) Briefly explain how a brute force attack is carried out. [2]
Q10. Jack is sent an email, offering him the latest iPhone for £99. They tell him it is a special offer because they have
some bankrupt stock. You suspect that this is a phishing attack. Describe what a phishing attack is and explain the
advice that you would give to Jack. [4]
Q11 Peter will also install a Virtual Private Network (VPN) onto his home computer, as well as on all of his other
devices, including his phone and tablet. His job frequently takes him abroad. Explain why installing a VPN onto all of
his devices is a good idea. [5]
5.
6. State one advantage to the user of multi-tasking. [1]
7. Explain two ways in which an operating system manages the memory of a computer. [2]
Page 21 of 37
10. Excluding backing up and compressing files, state four common file management actions an operating
system facilitates. [4]
12. State two reasons for compressing video files for sharing on The Internet. [2]
End of test
Total 20 marks
Page 22 of 37
Page 23 of 37
1. State three principles of the Data Protection Act 2018. [3]
2. State what is made illegal under the Computer Misuse Act 1990. [1]
3. State the definition of the term “Data Subject” under the Data Protection Act 2018. [1]
4. State two reasons why a country might decide to restrict access to the Internet for its citizens.
[2]
5. Describe three environmental issues with the manufacturing, use and disposal of computer technology.
[3]
6. State two differences between open source and proprietary software. [2]
7. A supermarket is reducing the number of checkout operators in favour of self-service checkout terminals.
Explain the impact for the customer, company and workers? [8]
Page 25 of 37
1. State what is meant by the term, “abstraction”. [1]
Page 26 of 37
6. Label each of the flow diagram symbols below in the middle of the symbol. [3]
7. Illustrate the first three steps of a bubble sort on the numbers: 5, 10, 7, 8 [3]
9. The following algorithm should output the t times table in the format:
1x8=8
2 x 8 = 16
3 x 8 = 24
… (up to 12x)
Correct errors in the pseudocode and complete the output statement. [4]
t = int(input(“Enter the times table you want to output:”))
for x = 1 to 12
p = t * t
output statement using p needed here
next x
print( )
End of test
Total 20 marks
Page 27 of 37
Page 28 of 37
1. Describe what is meant by the term, “constant”. [2]
2. State what is meant by the term, “casting” and give an example. [2]
Write a line of code to extract and output “ENC” from the string x. [2]
Page 29 of 37
5. State one similarity and one difference between a function and a procedure. [2]
6. Jane has been learning to program for some time, but never uses procedures in her code.
State two reasons why she would be advised to do this. [2]
7. An online order form requires the user to enter data into a form. Complete the table. [4]
Variable Purpose Data Type
name
Quantity Holds the number of items to be ordered.
Telephone Holds the telephone number of the customer.
Price Holds the price of the item.
Updates Indicates whether the customer is to receive marketing
emails in the future.
8. A set of records is held in a database table called ‘customers’ as shown below. Write a SQL command to
return only the surname of customers with reward points over 1000. [3]
card_no surname reward_points
00056432 Baker 3455
00023198 Evans 876
00098255 Smith 8775
End of test
Total 20 marks
Page 30 of 37
Page 31 of 37
1. Describe three ways in which a programmer can make their code maintainable. [3]
3. The following program does not work. State the logic error. [1]
total = 32
tests = 0
average = total/tests
6. The following program does not work. Explain the error in this program and state whether it is a syntax or
logic error. [2]
Page 32 of 37
7. An online order form accepts a quantity between 1 and 10 for a product. Suggest suitable test data for this
program and state why the test is necessary. [6]
8. Explain what is meant by the term, “length check” and give an example. [2]
9. A car dealership uses a computer system to record details of the cars that it has for sale. Each car has a
make, model, age and number of miles driven.
i. The car dealership only sells cars that have fewer than 10 000 miles and are 5 years old or less.
Write an algorithm that will:
ask the user to enter the number of miles and the age of a car
validate the input to check that only sensible values that are in the given range are entered
output True if valid data has been entered or False if invalid data has been entered.
[5]
ii. The validation routine from part (i) must be tested with normal, erroneous and boundary test data.
Identify suitable test data for each type of test.
[3]
Miles Age
Normal
Erroneous
Boundary
A A
C C A B
B B
Page 34 of 37
4. Complete the truth table for the logic diagram below: [8]
X T U W X Y Z
T
Z
U Y
W
5. Complete the boxes on the diagram with a 0 or 1 to show the state of the four outputs: [4]
1
0
Page 35 of 37
1. A programmer uses a high level language to produce code for an interpreter.
State the name of the code they are producing. [1]
2. State two reasons why the programmer would choose to write their code in a high-level language.
[2]
4. State two features of an interpreter and explain why this is advantageous to the programmer.
[4]
Page 36 of 37
5. The interpreter produces machine code. Describe is meant by the term,
“machine code”? [2]
6. State the relationship between a mnemonic in a low-level language and a machine code instruction.
[1]
End of test
Total 20 marks
Page 37 of 37