OCRLevel 240 resources

OCR Level 2 Information Technology (Cambridge Nationals) Past Papers

Free OCR Level 2 Information Technology (Cambridge Nationals) past papers. Essentials of IT, essentials of cyber security, cloud technology. 29 resources.

📅Multiple series📄40 resources availableFree to download

Download Past Papers

Type
Year

40 of 40 resources — page 1 of 2

January 2023

4 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme

June 2023

4 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme

January 2022

4 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report

June 2022

5 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report
📊

Information Technology – Examiners’ report – Cloud technology

Examiner Report

January 2021

3 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme

January 2020

5 files

Information Technology – Mark scheme – Essentials of IT

Mark Scheme
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report
📊

Information Technology – Examiners’ report – Essentials of IT

Examiner Report
📊

Information Technology – Examiners’ report – Essentials of cyber security

Examiner Report

Information Technology – Mark scheme – Essentials of cyber security

Mark Scheme

IT Essentials and Cyber Safety: OCR Level 2 Cambridge Nationals in Information Technology

OCR Level 2 Cambridge Nationals in Information Technology is a GCSE-equivalent vocational qualification providing practical knowledge of IT systems, cyber security, and cloud technology. It is designed for students who use technology regularly and want formal recognition of their IT knowledge, or who want to progress into Level 3 IT qualifications or technology apprenticeships. The Essentials of IT examined unit covers the fundamental concepts of IT in practice: computer hardware components and their functions, operating systems and software types, networking basics (LANs, WANs, internet, Wi-Fi, Bluetooth), data storage technologies (cloud vs local, HDDs, SSDs, USB), and how organisations use IT systems. It also covers digital literacy skills: file management, email etiquette, document formatting, and the responsible use of technology. The Essentials of Cyber Security examined unit addresses the growing threat landscape for individuals and organisations: types of malware (viruses, ransomware, spyware, adware, Trojans), social engineering attacks (phishing, vishing, smishing, pretexting), password security (strong passwords, multi-factor authentication, password managers), network security basics (firewalls, encryption, VPNs), and the legal framework (Computer Misuse Act offences and penalties, GDPR personal data obligations). The Cloud Technology internally assessed unit covers cloud computing concepts: public, private, and hybrid cloud models; cloud services (email, storage, productivity software); the advantages and risks of cloud adoption; and data governance in cloud environments.

Exam Paper Structure

Essentials of ITNo calculator

Core IT concepts examined unit

Varies🎯 Varies marks📊 Varies% of grade
Computer hardware: CPU, RAM, storage, input/output devicesOperating systems, software types, and file managementNetworking: LANs, WANs, Wi-Fi, internet, protocolsDigital literacy: email, documents, responsible IT use
Essentials of Cyber SecurityNo calculator

Security fundamentals examined unit

Varies🎯 Varies marks📊 Varies% of grade
Malware: viruses, ransomware, spyware, TrojansSocial engineering: phishing, vishing, smishingPassword security and multi-factor authenticationComputer Misuse Act and GDPR obligations

Key Information

Exam BoardOCR
Specification CodeCambridge Nationals Level 2 in Information Technology
QualificationLevel 2
Grading ScalePass / Merit / Distinction
Assessment TypeExternally examined units + internally assessed units
TiersNo tiers
Number Of Papers2 examined units
Exam DurationVaries
Total MarksVaries
Calculator StatusNot required
Available SessionsMultiple series
Total Resources29

Key Topics in Information Technology

Topics you need to know

Computer hardware: CPU, RAM, storage technologies, input/outputOperating systems: functions, types, file managementNetworking: LANs, WANs, routers, switches, Wi-Fi, protocolsMalware types: viruses, ransomware, spyware, Trojans, adwareSocial engineering: phishing, vishing, smishing, pretextingCyber security controls: firewalls, encryption, MFA, VPN, updatesComputer Misuse Act: offences, penalties, unauthorised accessGDPR: personal data, data subject rights, organisational obligations

Exam Command Words

Command wordWhat the examiner expects
IdentifyName a specific hardware component, malware type, or security threat from a description
DescribeGive a detailed account of a hardware component, network type, or cyber attack
ExplainGive technical reasons for how an IT system, security measure, or attack works
EvaluateAssess the suitability of an IT solution or security measure for a given context
SuggestRecommend a specific IT or security solution for a given organisational scenario

Typical Grade Boundaries

GradeApproximate mark needed
Distinction65–100%
Merit50–64%
Pass35–49%

⚠️ Typical OCR Level 2 Cambridge Nationals grade boundaries. Pass/Merit/Distinction awarded per unit.

Hardware Fundamentals, Malware Types, and Online Safety

Essentials of IT questions reward precise technical vocabulary. Know the key hardware components and their roles: CPU executes instructions (measured in GHz clock speed); RAM provides temporary working storage (faster access, volatile); hard drive/SSD provides permanent storage (slower access, non-volatile); GPU handles graphical processing. The relationship between CPU, RAM, and storage is a common question: more RAM allows more applications to run simultaneously; a faster CPU processes instructions more quickly; an SSD dramatically speeds up file access compared to an HDD. Networking questions often confuse students between hardware types. A router connects different networks and forwards data packets between them (typically connects your home network to the internet); a switch connects devices within the same network; a wireless access point provides Wi-Fi connectivity. A modem converts digital signals to analogue for transmission over telephone lines (or fibre optic signals — know that different modem types exist for different connection technologies). For Essentials of Cyber Security, know the specific characteristics of each malware type: a virus attaches to legitimate files and spreads when files are shared; ransomware encrypts files and demands payment for the decryption key; spyware secretly monitors user activity and sends data to an attacker; a Trojan masquerades as legitimate software to gain system access. Social engineering exploits human psychology rather than technical vulnerabilities — phishing targets users via fake emails; vishing via fake phone calls; smishing via fake SMS messages. For each, know the technical and human controls: email filters + user training for phishing; MFA + strong passwords for account compromise.

More OCR Level 2 Subjects

Explore other Level 2 subjects from OCR

Related Past Papers

AI-Powered Revision

Meet your AI Tutor

Get clear explanations, worked examples, and step-by-step guidance on any Level 2 Information Technology topic. Your personal AI tutor, free to try.

✓ No credit card required✓ Covers all OCR topics✓ Instant answers