Back to 课程

Computer Science GCES OCR

0% Complete
0/0 Steps
  1. Cpu Architecture Performance And Embedded Systems Ocr
    5 主题
  2. Primary And Secondary Storage Ocr
    6 主题
  3. Data Storage And Compression Ocr
    12 主题
  4. Networks And Topologies Ocr
    6 主题
  5. Wired And Wireless Networks Protocols And Layers Ocr
    6 主题
  6. Identifying And Preventing Threats To Computer Systems And Networks Ocr
    2 主题
  7. Operating Systems And Utility Software Ocr
    2 主题
  8. Ethical Legal Cultural And Environmental Impact Ocr
    2 主题
  9. Computational Thinking Searching And Sorting Algorithms Ocr
    3 主题
  10. Designing Creating And Refining Algorithms Ocr
    5 主题
  11. Programming Fundamentals And Data Types Ocr
    5 主题
  12. Additional Programming Techniques Ocr
    7 主题
  13. Defensive Design And Testing Ocr
    6 主题
  14. Boolean Logic Diagrams Ocr
    2 主题
  15. Programming Languages And Integrated Development Environments Ides Ocr
    3 主题
  16. The Exam Papers Ocr
    2 主题
  17. Structuring Your Responses Ocr
    3 主题
课 Progress
0% Complete

Exam code:J277

What are 8 mark questions?

  • 8 mark questions only appear in Paper 1 Computer Systems.

  • They test three Assessment Objectives:

    • AO1 Knowledge: facts, definitions and key concepts

    • AO2 Application: linking knowledge to the given scenario

    • AO3 Analysis and Evaluation: explaining impacts, consequences and balanced reasoning

  • To achieve top marks, you must show:

    • A balanced discussion that covers different sides of the argument

    • A sustained and logical chain of reasoning

Key command words

  • Command words tell you exactly what the examiner wants you to do in the question

  • They are important because each word has a specific meaning that changes how you should answer

  • Using the wrong style of answer, for example, describing when asked to evaluate, will lose marks even if your knowledge is correct

  • They help you structure your response in the right way, for example, giving balanced arguments when asked to discuss

  • Understanding them ensures you can show your knowledge, application and evaluation clearly and reach the higher mark bands

Command Word

Meaning

Compare

Give similarities and differences between two or more items or situations, referring to each throughout

Discuss

Offer a balanced review with a range of arguments or factors. Support with evidence and reach a clear conclusion

Evaluate

Assess strengths and weaknesses. Make judgments against criteria, considering implications and limitations

Outline

Give a brief account or summary of the main points

Step 1: Understand and define AO1 knowledge

  • Read the question carefully and identify the command word, such as discuss or evaluate

  • Identify the key topic, for example, students bringing their own devices

  • Begin with a clear definition or explanation of the key terms

Example
A school asks its students to bring in their own electronic devices, such as tablets, laptops or mobile phones, to use in lessons instead of purchasing new equipment.

Discuss the issues surrounding students bringing their own devices. Include in your discussion ethical issues, legal issues and privacy issues.

Step 2: First point with the chain of reasoning AO2 and AO3

  • Make a specific point about one issue, such as ethical, legal or privacy

  • Use the XY Z method

    • X is the starting factor or point

    • Y is the effect

    • Z is the consequence or impact

Example
One ethical issue is inequality. X Some students may not be able to afford good devices. Y This creates unfairness in learning opportunities. Z As a result, some students could be disadvantaged academically compared to wealthier peers.

Step 3: Balanced counterpoint AO3

  • Present the opposite perspective to show balance

  • Support it with reasoning and examples

Example

However, BYOD can reduce school costs. X Schools save money for other resources. Y This may improve learning overall. Z Therefore, all students could benefit indirectly.

Step 4: Add another issue for depth

  • Cover a second issue, such as privacy or legality

  • Use the same structure of a point plus a chain of reasoning, plus a counterpoint

Example
Privacy could be at risk if students’ personal devices are hacked. X This could expose sensitive information. Y This leads to safeguarding risks for pupils. Z Schools can reduce this risk with strict security policies and training.

Step 5: Wrap up

  • You should try to include a separate conclusion paragraph

  • Ensure your final paragraph shows balance and brings together the points made above

  • Evaluation marks are earned throughout the discussion as well as in the conclusion

Top tips for full marks

  • Be specific and always link points directly to the scenario

  • Use realistic examples to strengthen arguments

  • Always show both sides of an argument

  • Use linking words such as this leads to, as a result, consequently or therefore

  • Spend about 10 to 12 minutes on an 8-mark question

  • Practise with past paper questions to perfect the structure

Example exam question and model answer

A school asks its students to bring in their own electronic devices, such as tablets, laptops or mobile phones, to use in lessons instead of purchasing new equipment.

Discuss the issues surrounding students bringing their own devices. Include in your discussion ethical issues, legal issues and privacy issues.

Model 8-mark answer

One ethical issue is inequality. Some students may not be able to afford high-quality devices. This could lead to unfairness in lessons because those students might struggle to access the same resources as their peers. As a result, their learning opportunities could be negatively affected, creating a digital divide in the classroom. However, a benefit is that students who already own suitable devices can learn in a more comfortable and familiar way, which could boost confidence and efficiency in lessons.

A legal issue is software licensing. If students use their own devices, some might download or share unlicensed copies of software to complete tasks. This breaks copyright law and could put the school at risk of legal action. On the other hand, schools could issue clear policies and provide legal site-licensed software for free, which would reduce this risk and ensure that all students are compliant.

A privacy issue is data security. Personal devices may not have strong protection, making them vulnerable to malware or hacking. If students access school networks with insecure devices, sensitive data could be exposed, leading to safeguarding concerns. In contrast, schools can enforce rules such as requiring antivirus software or using secure school logins, which helps protect both student and school information.

In conclusion, while there are risks with fairness, legality and privacy, many of these can be managed with strong policies and school support. BYOD can reduce costs and give students flexibility, but schools must carefully balance these benefits against the possible drawbacks.

Responses

您的邮箱地址不会被公开。 必填项已用 * 标注