|
Section 6:
ICT Applications |
|
|
The course syllabus states that you should be able to: |
8.1 |
Physical safety |
|
- Describe common physical safety issues and what causes them (e.g. eletrocution from spilling drinks, fire from sockets being overloaded or equipment overheating, tripping over cables)
- Describe some simple strategies for preventing these issues
- Evaluate own use of ICT equipment and develop strategies to minimise the potential safety risks)
|
8.2 |
E-safety
|
|
- Explain what is meant by personal data
- Explain why personal data should be confidential and protected
- Explain how to avoid inappropriate disclosure of personal data including: own name, address, school name, a picture in school uniform
- Discuss why e-safety is needed
- Evaluate own use of the internet and use strategies to minimise the potential dangers (e.g. only using websites recommended by teachers, only using a learner-friendly search engine)
- Evaluate own use of email and use strategies to minimise the potential dangers (e.g. only emailing people already known, thinking before opening an email from an unknown person, never emailing the school's name or a picture of the learner in a school uniform)
- Evaluate own use of social media/networking sites, instant messaging and internet chat rooms and use own strategies to minimise the potential dangers (e.g. knowing how to block and report unwanted users, never arranging to meet anyone alone, always telling an adult first and meeting in a public place, avoiding the misuse of images, using inappropriate language, respecting confidentially)
- Describe measures which should be taken when playing games on the internet (e.g. not using real names).
|
7.3 |
Security of data |
|
- Effective security of data :
- Define the term hacking and describe it's effects
- Explian what is meant by the term hacking and the measure that must be taken in order to protect data
- Explain what is meant by the terms user id and password stating their purpose and how they are used to increase the security of data
- Explain what is meant by the terms biometric data and why biometric data is used.
- Security of data online:
- Explain what is meant by the term digital certificate and its purpose
- Explain what is meant by the term Secure Socket layer (SSL)
- Describe the features of a web page that identify it as using a secure server
- Define the terms: phishing, pharming, smishing
- Describe the methods which can be used to help prevent phishing, pharming and smishing
- Describe the potential for the malicious use of technology to collect personal data, report the attempt and avoid the disclosure of information
- Explain the difference between moderated and un-moderated forums and the relative security of these
- Explain the concept of and how to recognise spam mail and avoid being drawn into it
- Describe what encryption is and why it is used
- Define the term computer virus and describe it's effects
- Describe the effects of infecting a computer with a virus from a downloaded file
- Describe how to take preventative action to avoid the danger of infecting a computer with a virus from a downloaded file
- Describe the measures that must be taken in order to protect against hacking
- Describe how it is possible to be the subject of fraud when using a credit card online
- Explain the issues related to security of data in the cloud
- Explain the concept of a firewall and why it is used
- Discuss the effectiveness of different methods of increasing security.
|
|
|
This section is broken down into 16 parts. (Click links to visit each page) |
|
Part 2:
Data Handling
Applications
|
Part 3:
Measurement
Applications |
|
|
|
|
|
Learning Objectives
Starter Task
Plenary |
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
|
Part 5:
Modelling
Applications |
Part 6:
Applications in Manufacturing
Industries
|
Part 7:
School Management
Applications
|
Part 8:
Booking
Systems
|
|
|
|
|
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
|
Part 9:
Banking
Applications
|
Part 10:
Computers in
Medicine
|
Part 11:
Computers in
Libraries
|
|
|
|
|
|
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
Learning Objectives
Starter Task |
|
|
Revision Practice for Section 6: |
|
The links to the right contain some revision questions and mind maps that will help prepare you for the section 8 exam.
|
|
The 'fill in the blanks' link takes you to a Microsoft Word document which contains a wide-range of questions designed to test your knowledge on Safety and Security. You complete the document by filling in the blanks with words from the list.
The answers to the fill in the blanks task can be found on pages 3 - 4 of the document. Make sure you attempt the questions yourself before looking at the answers. Any mistakes you make should be corrected. |
|
|
The 'multiple choice self marking practice quiz' will present you with a series of exam style questions in a multiple choice format. When you complete the test you will given a score and grade. you will also be given the answers to questions that you may have gotten wrong. You should use this to help you correct any mistakes you make have made. |
|
|
The mind maps are diagrams which give you sharp and to-the-point revision information on all of the topics covered during this section. |
|
Practice Questions |
|
|
|
Mind Maps |
|
|
|
|
|
|
|
|
|
Section 4: Networks and the Effects of using them |
|
|
|
|
|
Section 10: Communication |
|
|
|
|
Links to Practical Units: |
Section 11: File Management |
Section 12: Images |
Section 13: layout |
Section 14: Styles |
Section 15: Proofing |
Section 16: Graphs and Charts |
Section 17: Document Production |
Section 18: Data Manipulation |
Section 19: Presentations |
Section 20: Data Analysis |
Section 21: Website Authoring |
|
|
|
|