GCSE Computer Science (J277) 2026 Exam Predictions ๐Ÿ”ฎ๐Ÿ’ป

For Cambridge OCR (J277) | New subject and early release

Because Computer Science is a brand new subject for us at Primrose Kitten, weโ€™ve released our 2026 Predicted Papers early! We want to give you the biggest head start possible to get to grips with the logic, the syntax, and those tricky 8-markers.

๐Ÿ“ฅ Download the New Computer Science Predicted Papers: These are fresh off the press and designed to mirror the real exam experience.

First off, take a deep breath. Inhale... exhale... ๐Ÿง˜โ€โ™€๏ธ Your mental health is the most important part of your revision toolkit. A calm mind codes better than a stressed one! ๐Ÿ’–

We know looking into the crystal ball for exam topics is stressful, but we are here to help guide your revision. Before we dive into our predicted papers, here is a massive disclaimer: We have not seen the exams! ๐Ÿšซ๐Ÿ‘€ Predictions are fun and helpful for focusing your final revision, but they are not a guarantee. Please, please make sure you review the entire specification. The examiners can (and will!) ask about anything from the syllabus.

Table of Contents

Ready to see what might come up? Let's dive in! ๐Ÿš€

Paper 1: Computer Systems Predictions 2026 (J277/01) ๐Ÿ–ฅ๏ธ

This paper is all about the theoryโ€”how the metal box actually works. Based on trends from 2022 to 2025, here is where we think the focus might land in 2026.

The 8-mark extended response question is a staple of Paper 1. In recent years, we've seen questions on Open Source vs. Proprietary software (2024) and the impacts of compression/web technologies. Our 2026 Prediction: We suspect a swing back towards Environmental Issues (e-waste, energy consumption of data centres) or the Ethical/Legal implications of AI and algorithmic bias. Make sure you can discuss the Data Protection Act 2018 and the Computer Misuse Act 1990 with confidence! ๐Ÿ“œ

2. Systems Architecture & The CPU ๐Ÿง 

The Von Neumann Architecture is the bread and butter of this paper. You practically have to know the Fetch-Execute cycle.

  • Watch out for: The specific roles of the registers. Don't just say "MAR stores address." Be specific: "MAR stores the address of the memory location to be fetched or written to." Precision gets marks!  

3. Networks & Security ๐Ÿ”

This topic is huge. We often see questions rotating between network topologies (Star vs Mesh) and security threats.

  • Prediction: Phishing/Social Engineering was heavy recently, expect a technical deep dive into SQL Injection or prevention methods (like firewalls vs MAC address filtering) this year.

Paper 2: Computational Thinking, Algorithms & Programming Predictions 2026 (J277/02) ๐Ÿค–

This is the "doing" paper. It tests your logic and coding skills.

1. Algorithms: Searching & Sorting ๐Ÿ“‰

We've seen Bubble Sort and Binary Search pop up frequently.

  • 2026 Prediction: Keep an eye on Merge Sort and Insertion Sort. You might be asked to complete a trace table for an Insertion Sort or explain the "divide and conquer" approach of a Merge Sort.

2. Programming Techniques: SQL vs. File Handling ๐Ÿ“‚

These two often trade places as the "tricky" technical question.

  • SQL: Remember your commands: SELECT, FROM, WHERE. (Remember, you don't need INSERT or UPDATE for J277!).

  • File Handling: Make sure you know the sequence: open() -> read()/write() -> close(). Forgetting to close the file is a classic way to lose easy marks!  

3. Logic Gates โšก

Don't drop silly marks here! A common examiner complaint is students drawing the NOT gate as just a triangle. It must have the little circle at the end to be a NOT gate; otherwise, it's just a buffer!  

How Accurate Are We? ๐Ÿค”

You might be wondering, "Can I trust these predictions?" We put a lot of work into analysing past paper trends, examiner reports, and specification weightings to give you the best possible guess.

๐Ÿ‘‰ Curious about our track record? Read our blog post on How Accurate Are Predicted Papers? ๐Ÿ‘‰ Want to know the science behind the magic? Check out How do we write our Predicted Papers?

Don't just take our word for it! Our resources have over 1,000 5-star reviews from students just like you. โญโญโญโญโญ ๐Ÿ‘‰ Check out our Happy Customers here!

Good luck with your revision! You've got this! ๐Ÿ’ช๐ŸŽ‰

Disclaimer: These predictions are based on analysis of past trends and are for revision guidance only. Always revise the full specification.

๐Ÿ“š The Exam Structure: What You Need to Know

Before we gaze into our crystal ball, let's make sure youโ€™re comfortable with exactly how the course is assessed. The OCR qualification is split into two equal papers.

Paper 1: Computer Systems (J277/01) ๐Ÿ–ฅ๏ธ

  • Focus: The "theory" sideโ€”how the physical hardware works and the issues surrounding it.

  • Duration: 1 hour 30 minutes.

  • Marks: 80 marks (worth 50% of your GCSE).

  • Calculators: No calculators allowed! (Time to brush up on your mental maths for binary conversions ๐Ÿง ).

  • Key Topics: Systems Architecture (CPU), Memory, Networks, Security, and Ethical/Legal Impacts.

Paper 2: Computational Thinking, Algorithms & Programming (J277/02) ๐Ÿค–

  • Focus: The "practical" sideโ€”logic, algorithms, and writing code.

  • Duration: 1 hour 30 minutes.

  • Marks: 80 marks (worth 50% of your GCSE).

  • Section A: Focuses on theory, like Logic Gates and standard algorithms.

  • Section B: This section tests your ability to read and write code. Youโ€™ll need to write algorithms in either OCR Exam Reference Language or a high-level language like Python.  

Component 01: Computer Systems (J277/01) โ€“ Deep Dive and Topic Analysis

Component 01 serves as the theoretical bedrock of the qualification. It tests your knowledge of the physical and logical infrastructure that enables computation.

1.1 Systems Architecture: The Core of Computation

The study of Systems Architecture is centred on the Von Neumann architecture. This model, describing the stored-program concept where instructions and data share the same memory space, is the fundamental theory students must master.

The Fetch-Execute Cycle and CPU Registers

Candidates are frequently asked to describe the role of specific registers. The examiner reports highlight that candidates often understand the cycle in broad strokes but lack the precision required for full marks.

  • Program Counter (PC): Students must articulate that this register holds the memory address of the next instruction to be processed, not the current one.

  • Memory Address Register (MAR): The conduit for addresses. A common error is failing to specify that the MAR holds the address of the location in memory where data is to be fetched or stored.

  • Memory Data Register (MDR): This register holds the actual instruction or data fetched from memory. The distinction between the address (MAR) and the contents (MDR) is a critical discrimination point in assessment.

  • Accumulator (ACC): The temporary storage for the results of arithmetic and logical operations performed by the ALU.

Examiners have noted that students frequently conflate the roles of the MAR and MDR. Successful responses clearly delineate the flow of data: the PC passes the address to the MAR; the MAR sends this to memory; memory returns the data to the MDR.

CPU Performance Determinants

The specification demands a nuanced understanding of how physical characteristics influence processing speed. Questions typically frame this through comparative scenarios, such as "Explain why Computer A is faster than Computer B."

Characteristic

Impact on Performance

Nuance for Assessment

Clock Speed

Determines the number of Fetch-Execute cycles per second.

Higher is generally faster, but heat generation is a limiting factor.

Cache Size

High-speed memory closer to the CPU than RAM.

Larger cache reduces the need to fetch data from slower RAM, improving efficiency for frequently used instructions.

Number of Cores

Independent processing units capable of executing instructions simultaneously.

Critical Insight: Doubling cores does not necessarily double performance. Software must be optimised for multitasking/multithreading, and there is overhead in managing core communication.

Embedded Systems

Embedded systems appear regularly as definition and identification questions. The defining characteristic required by mark schemes is that the system has a dedicated function or specific purpose, often within a larger mechanical or electrical system.

  • Accepted Examples: Washing machines, dishwashers, GPS systems, engine management units, traffic lights.

  • Rejected Examples: General-purpose laptops, smartphones (unless the context specifies a subsystem), or generic "computers".

  • Examiner Feedback: Candidates often state "it is built into a device" but fail to mention the "limited/dedicated purpose," which is the primary discriminator for marks.

1.2 Memory and Storage: The Mathematics of Data

This section acts as the primary vehicle for mathematical assessment within Paper 1. The specification requires students to manipulate binary data and calculate storage requirements without a calculator.

Primary vs. Secondary Storage

The distinction between RAM (Random Access Memory) and ROM (Read Only Memory) is fundamental.

  • RAM: Volatile. It stores the operating system, running programs, and data currently in use. A standard question asks what happens to the contents of RAM when power is lost (it is wiped).

  • ROM: Non-volatile. It stores the bootstrap loader or BIOS required to start the computer.

  • Virtual Memory: This is a complex concept for many students. It acts as an overflow for RAM, using a section of secondary storage (hard drive) as temporary RAM. Assessment often focuses on the performance penalty (thrashing/disk swapping) associated with using virtual memory due to the slower read/write speeds of secondary storage compared to RAM.

Data Representation and Binary Logic

Computer Science places heavy emphasis on the manipulation of binary numbers.

  • Binary Shifts: In the June 2024 paper, as well as previous specimen papers, students were asked to perform binary shifts. A left shift multiplies the number while a right shift divides it.

    • Implication: Students must explicitly state that bits shifted "off" the end of the register are lost, leading to a loss of precision in division or an overflow error in multiplication.

  • Hexadecimal Conversion: Students must convert between Denary (0-255), Binary (8-bit), and Hexadecimal (00-FF). Examiner reports indicate that while the method (splitting the byte into nibbles) is often understood, simple arithmetic errors in adding the values of the nibbles are common.

  • Character Sets: The comparison between ASCII (7-bit, 128 characters, English language focus) and Unicode (16/32-bit, covers all global languages and emojis) is a standard 2-4 mark question. The trade-off is storage space versus character representation range.

File Size Calculations

One of the most technically demanding aspects of Component 01 is the calculation of file sizes. Students must memorise specific formulas and apply them.

  • Common Pitfalls:

    • Unit Conversion: The result of these formulas is in bits. Questions almost always ask for the answer in bytes, kilobytes, or megabytes. Students frequently forget to divide by 8 to convert bits to bytes.

    • MetaData: Students must acknowledge that the calculated size is "raw" data and the actual file size will be slightly larger due to metadata (dimensions, author, date), though calculations usually ignore this for simplicity.

1.3 Computer Networks, Connections, and Protocols

This unit covers the infrastructure of the internet and local networks. It requires a mix of diagrammatic interpretation and protocol knowledge.

Topologies: Star vs. Mesh

Students are often presented with network diagrams and asked to identify the topology.

  • Star Topology: All devices connect to a central switch.

    • Advantages: Easy to add new devices; if one cable fails, the rest of the network is unaffected; fewer data collisions.

    • Disadvantages: Reliance on the central switch; high cabling cost.

  • Mesh Topology: Devices connect to multiple other devices (full or partial).

    • Advantages: High redundancy (no single point of failure).

    • Disadvantages: Expensive and complex to install.

Protocols and Layering

The TCP/IP stack is the framework for understanding data transmission. Students must know the function of specific protocols within the application layer.

Protocol

Full Name

Function & Assessment Nuance

HTTP/HTTPS

Hypertext Transfer Protocol (Secure)

Used for web browsers to access websites. HTTPS uses encryption.

FTP

File Transfer Protocol

Used for moving files between a client and a server.

POP3

Post Office Protocol

Retrieves email from a server. Key nuance: It downloads and deletes the mail from the server.

IMAP

Internet Message Access Protocol

Retrieves email. Key nuance: It syncs with the server, allowing access from multiple devices.

SMTP

Simple Mail Transfer Protocol

Sending email between servers. Students often confuse this with retrieval.

Hosting and The Cloud

The concept of the "Cloud" (remote servers accessible via the internet) is a frequent topic for 4-6 mark discussion questions.

  • Pros: Accessibility from anywhere, automatic backups, easy collaboration, no need for expensive local hardware.

  • Cons: Dependence on internet connection, security concerns (who owns the data?), potential subscription costs.

1.4 Network Security: Threats and Mitigation

Security is taught through a "threat vs. prevention" framework. Questions usually present a scenario (e.g., "A school network is under attack") and ask for identification of the threat and a matching prevention method.

Threat Vectors and Defences

  • SQL Injection: A malicious user enters SQL commands into an input field to manipulate a database.

    • Prevention: Input Sanitisation (cleaning inputs) or Validation.

    • Assessment Note: Examiners look for specific terminology. "Validation" is good, "Input Sanitisation" is better.

  • Brute Force Attack: Trial-and-error guessing of passwords.

    • Prevention: Account lockouts after n attempts; strong password policies; CAPTCHA.

  • Phishing: Social engineering via email to steal credentials.

    • Prevention: User training; verifying sender addresses.

  • Denial of Service (DoS): Flooding a server with traffic to make it offline.

    • Prevention: Firewalls (to filter traffic); blacklisting IPs.

1.5 Systems Software

This section distinguishes between Operating Systems (OS) and Utility Software.

  • Operating System Roles: User Interface, Memory Management, Multitasking, Peripheral Management (Drivers), and User Management.

  • Utility Software: Encryption software, Defragmentation (reorganising magnetic hard drive data to speed up access), Data Compression, Backup software.

    • Defragmentation Insight: Examiners note that students must clarify that defragmentation is primarily beneficial for magnetic hard drives (HDDs) and not SSDs, as SSDs have no moving parts and random access speeds are uniform.

This unit is the primary domain of the 8-mark extended response question found at the end of Paper 1. These questions are holistic, requiring students to weave together different strands of the specification.

The "Discuss" Command Word

The 8-marker is marked using a "Levels of Response" grid (Level 1-3). To achieve Level 3 (6-8 marks), candidates must produce a "considered and balanced review" that includes a range of arguments and valid conclusions.

  • Legal Frameworks: Students must cite relevant legislation correctly:

    • Data Protection Act (2018): Privacy of personal data.

    • Computer Misuse Act (1990): Hacking and unauthorized access.

    • Copyright, Designs and Patents Act (1988): Intellectual property and software licensing.

    • Freedom of Information Act (2000): Access to public authority data.

    • Investigatory Powers Act (2016): Surveillance and interception of communications.

Licensing: Open Source vs. Proprietary

The June 2024 Paper 1 featured a significant 8-mark question on this topic. Students were asked to recommend a license type for a new game.

  • Open Source: Source code is available to the public. Users can modify and distribute it. Benefit: Community collaboration/fixing. Drawback: No guarantee of profit; support may be patchy.

  • Proprietary: Source code is closed. Users buy a license to use the compiled code. Benefit: Profit for developers; polished product; dedicated support. Drawback: Cost for users; cannot be modified.

Environmental Issues

Topics include e-waste (disposal of devices), energy consumption of data centers, and the resource cost of manufacturing (rare earth metals). A "balanced" argument might contrast the environmental cost of producing a computer with the environmental savings of using it (e.g., video conferencing reducing air travel).

Component 02: Computational Thinking, Algorithms, and Programming (J277/02) โ€“ The "Practical" Paper

Component 02 assesses the student's ability to think like a computer scientist. This paper has been the subject of intense pedagogical scrutiny, particularly following the June 2023 series, which was widely regarded by the teaching community as exceptionally difficult. This "crisis" highlighted a shift in OCR's assessment strategy towards AO2 (Apply) and AO3 (Analyse), requiring students to solve novel problems rather than recall rote definitions.

2.1 Algorithms: The Engine of Logic

This section typically commands the highest mark allocation in Paper 2. It covers standard algorithms and the tools used to design them.

Searching Algorithms

  • Binary Search: A "divide and conquer" algorithm.

    • Pre-requisite: The list must be sorted.

    • Process: Check the middle item. If it's the target, stop. If the target is lower, discard the right half. If higher, discard the left half. Repeat.

  • Linear Search: Checks every item in order. Simple but inefficient on large lists.

Sorting Algorithms

Students must understand the mechanics of three specific sorts:

  • Bubble Sort: Compares adjacent pairs and swaps them if they are in the wrong order. Passes through the list until no swaps are made.

    • Assessment: Students are often given a list and asked to show the state of the list after the "first pass".

  • Merge Sort: A recursive "divide and conquer" algorithm. Splits the list into individual sub-lists and then merges them back together in order.

    • Assessment: Often tested via diagrammatic completion.

  • Insertion Sort: Takes one item at a time and places it into the correct position within a sorted sub-list.

Trace Tables

Trace tables are a critical tool for assessing algorithmic thinking. Students are given a code snippet (often containing loops and if statements) and a table with columns for each variable. They must row-by-row track the changing values.

  • Common Errors: "Off-by-one" errors are frequent, where students execute a loop one time too many or too few. Logic errors in while vs do-while (or repeat-until in pseudocode) structures are also common pitfalls.

2.2 Programming Fundamentals and Data Types

This section requires students to read, write, and correct code. The specification allows responses in OCR Exam Reference Language (ERL) or a high-level language (Python, C#, VB.NET).

The Role of Exam Reference Language (ERL)

OCR uses ERL to ensure questions are language-neutral. While students can write in Python, they must be able to read ERL.

  • Syntax Awareness: ERL uses keywords like input, print, if...then...elseif...else...endif, switch...case.

  • The Debate: While students are encouraged to write in the language they are most comfortable with (usually Python), high-performing candidates often familiarise themselves with ERL to ensure they don't misinterpret the question prompt.

String Manipulation

Standard operations include:

  • Length: string.length

  • Substring: string.substring(x, y) or string[x:y]

  • Case Conversion: string.upper(), string.lower()

  • Concatenation: Joining strings using + or ,. The June 2024 examiner report noted that students struggled when combining casting (converting numbers to strings) with concatenation.

Casting and Data Types

  • Casting: The process of converting one data type to another (e.g., int("5")). This is vital when taking user input, which defaults to a String in many languages, and using it for mathematical calculations.

  • Types: Integer (whole numbers), Real/Float (decimals), Boolean (True/False), Character (single letter), String (text).

2.3 Additional Programming Techniques

This section differentiates the higher grades (7-9) from the lower grades. It involves specific technical implementations.

SQL (Structured Query Language)

The J277 specification is very strict about the SQL commands required. Students only need to know SELECT, FROM, and WHERE. INSERT, UPDATE, and DELETE are NOT required.

  • Syntax Precision:

    • SELECT lists the fields (columns) to return. * selects all.

    • FROM specifies the table name.

    • WHERE specifies the criteria.

  • Wildcards: The % wildcard is used with LIKE (e.g., WHERE name LIKE "A%" finds names starting with A).

  • Common Errors: Forgetting to put quotes around text values (e.g., WHERE Colour = "Red" vs WHERE Colour = Red). The latter causes a syntax error.

File Handling

Students must be able to write an algorithm to read from or write to a text file.

  • The Lifecycle: open -> read/write -> close.

  • Modes: Write mode ("w") typically overwrites the file. Append mode ("a") adds to the end. Read mode ("r") accesses data.

  • Critical Step: Marks are often lost for failing to close the file (file.close()) at the end of the operation. This is a crucial data integrity step.

Arrays (1D and 2D)

  • 1D Arrays: A simple list. Accessed via index list.

  • 2D Arrays: A list of lists (a grid). Accessed via list[row][column].

  • Assessment: The 2023 paper featured a challenging question involving iteration through a 2D array. Students must be comfortable using nested loops (a loop inside a loop) to traverse these structures.

2.3 Producing Robust Programs

This unit focuses on software engineering principles: making code "bulletproof."

Defensive Design

  • Input Validation: Checking if data meets criteria before processing.

    • Range Check: Is the number between 1 and 10?

    • Type Check: Is the input an integer?

    • Length Check: Is the password at least 8 characters?

    • Presence Check: Has data been entered?

    • Format Check: Is it an email address (contains @)?.

  • Authentication: Verifying identity (passwords, biometrics).

  • Maintainability: Ensuring code can be understood by others.

    • Techniques: Indentation, Meaningful Variable Names, Comments, Use of Constants, Modularisation (Sub-programs).

Testing

  • Iterative Testing: Testing during the development phase (module by module).

  • Final/Terminal Testing: Testing at the end of development against the requirements.

  • Test Data Types:

    • Normal: Valid data that should pass (e.g., 5 for a range 1-10).

    • Boundary: Data at the limit (e.g., 1 or 10).

    • Invalid/Erroneous: Data that should fail (e.g., 11 or "ten").

  • Error Types:

    • Syntax Error: The code violates the rules of the language (e.g., missing colon). It won't run.

    • Logic Error: The code runs but produces the wrong result (e.g., using > instead of <).

2.4 Boolean Logic

This section tests the mathematical logic that underpins hardware.

  • Logic Gates: AND (conjunction), OR (disjunction), NOT (negation).

  • Drawing Circuits: Students must draw circuits based on a logical statement (e.g., P = (A AND B) OR NOT C).

  • Examiner Insight: A persistent issue highlighted in 2024 is the drawing of the NOT gate. Students often draw a triangle without the small circle at the tip. This is incorrect; the triangle alone represents a buffer, not an inverter. The circle is mandatory for the mark.

  • Truth Tables: Completing tables for complex logic statements. Students should look for intermediate steps (e.g., solve A AND B first, then apply NOT).

2.5 Programming Languages and IDEs

  • High-Level vs. Low-Level Languages:

    • High-Level: Human-readable (Python, Java). Portable. Needs translation.

    • Low-Level: Machine code (Binary) or Assembly. Hard to read. Specific to hardware. Fast and memory efficient.

  • Translators:

    • Compiler: Translates the whole code at once. Produces an executable. Optimises code. Reports all errors at the end.

    • Interpreter: Translates line-by-line. Good for debugging. Slower execution. Stops at the first error.

  • Integrated Development Environments (IDEs): Tools that help programmers.

    • Features: Editor, Error Diagnostics (debugging tools), Run-time Environment, Syntax Highlighting, Auto-completion.

Technical Deep Dives (Specific Syntax & Rules)

To achieve the highest grades, candidates must master the minutiae of technical syntax. This section outlines specific rules that often catch students out.

Deep Dive: SQL Syntax and "Wildcards"

While professional SQL is vast, OCR restricts the scope significantly. However, this restriction implies that strict adherence to the supported subset is required.

  • The Wildcard %: The % symbol represents "any sequence of characters."

    • LIKE "S%" matches "Smith", "Sallie", "S".

    • LIKE "%son" matches "Johnson", "Jackson".

    • LIKE "%a%" matches anything containing the letter 'a'.

  • Data Types in SQL: When querying specific data types, syntax matters.

    • Strings: Must be in quotes (WHERE name = "Bob").

    • Integers: No quotes (WHERE age = 21).

    • Dates: Usually typically treated as hashtags or quotes depending on the ERL, but quotes are generally safer in exams unless specified (WHERE date = "01/01/2023").

Deep Dive: File Handling Protocols

The specific sequence of file handling is a common 4-6 mark coding question.

  1. Variable Assignment: You must assign the file to a variable to manipulate it.

    • Python: myFile = open("data.txt", "r")

  2. Read/Line Operations:

    • line = myFile.readline() reads a single line.

    • allData = myFile.read() reads the entire file.

  3. The Loop (Reading): A standard pattern is the while NOT end of file loop.

    • ERL: while NOT myFile.endOfFile()

  4. Writing:

    • myFile.write("Hello\n") โ€“ note the \n for a new line. Without it, all text is appended to the same line.

  5. Closing: myFile.close(). This is the most forgotten step. It releases the file from memory and ensures changes are saved.

Assessment Strategy & Exam Technique

Success in Computer Science is as much about exam technique as it is about knowledge. Understanding how to answer is crucial.

The Command Words

OCR uses a specific hierarchy of command words. Recognising these determines the length and depth of the required answer.

Command Word

Cognitive Demand

Requirement

Typical Marks

Identify / State

Low (Recall)

A name, a number, or a short phrase. No explanation needed.

1

Describe

Medium (Knowledge)

"Paint a picture." Give details of a process or feature.

2-3

Explain

High (Understanding)

Cause and Effect. You must use a connective ("because", "so that", "therefore"). "State the point, explain the impact."

2-4

Compare

High (Analysis)

Requires similarities AND differences. Must refer to both items being compared.

4-6

Discuss

Very High (Evaluation)

Balanced argument. Pros/Cons. Legal/Ethical links. Conclusion.

8

Mathematical Fluency Strategies

Since calculators are banned, candidates must employ specific strategies:

  • Powers of 2: Memorise the sequence: 1, 2, 4, 8, 16, 32, 64, 128, 256, 512, 1024. This is essential for binary conversion and storage calculation.

Meta-Analysis of Examiner Reports (2022โ€“2024)

A review of the last three years of examiner reports highlights persistent "traps" for students:

  1. Vagueness in Security: "It stops viruses" is never a valid answer. "It scans files against a database of known signatures to identify and quarantine malware" is a full-mark answer.1

  2. Pseudocode Inconsistency: Students often start writing in Python, switch to English, and then use a flowchart arrow. While "pseudocode" is flexible, logic must be consistent. The 2023 report emphasised that unreadable or contradictory logic cannot be credited.

  3. Reading the Scenario: In "Explain" questions, if the scenario is about a Law Firm, general answers about a School will score zero. Answers must be context-aware.