Friday, April 13, 2007

Data Protection Act

Click HERE for student revision notes

Computer Misuse Act

Internet security

Include:
- Passwords (reasons for, rules to create etc.)
- Hackers (ethos, history, legislation - link to Computer Misuse Act page)
- Virus (types of)
- Examples of recent hacking / viruses

Click HERE for student revision notes

Modelling and Simulators

Click HERE for student notes

LANs and WANs

User Interfaces

Include:
- CLI
- GUI
- Menu

For each:
- Advantages / disadvantages
- Examples of application

Click HERE for student revision notes

Electronic Point Of Sale (EPOS)

Health and Safety

Click HERE for student notes

Storage Devices

Include:
- types of storage device
- images of the device
- examples of their use
- limitations
- costs?

Output Devices

Include:
- types of output device
- images of the device
- examples of their use
- limitations
- costs?

Input Devices

Include:
- types of input device
- images of the device
- examples of their use
- limitations
- costs?

Flowcharts

Video conferencing and teleworking

Information Encoding

Images - Bitmap v Vector

Include:
- What is a Bitmap?
- What is a Vector?
- Advantages and disadvantages of each
- Who uses them?
- Examples of their use
- Useful / interesting websites about them

Project Life Cycle

Databases part 2 - Checks

Explain using an example:
- Validation / verification
- Range / presence checks

Click HERE for student revision notes

Databases part 1

Include:
- Definition of a database
- Examples of databases in use
- Using an example, define:
- a record
- a field
- key field
- Four main data types

Click HERE for student revision notes

The Central Processing Unit (CPU) and friends

Include:
CPU components
- Control Unit
- ALU
- IAS
- Input / Output / Processing diagram

Friends
- ROM (eg. BIOS)
- RAM
- Motherboard
- Ribbon cable
- PSU
- Link to input / output / storage devices

Click HERE for student revision notes

Internet and eMail

Internet include:
- Classic "Connecting to Internet" diagram
- Main components needed
- Main software used (Browsers, email clients etc.)
- ISPs
- Routers
- Current narrowband / broadband speeds available
- Link to Internet security page

eMail include:
- How to send an email (list or diagram)
- Advantages / Disadvantages

Harder research - if you are good enough! ;)
- What are the protocols used (IP, HTTP, FTP, HTML)
- Web 2.0?

Click HERE for student revision notes

Tuesday, March 20, 2007

Viruses


Sunday, February 25, 2007

Section C

Section B

Section A

What are you examined on?

  • Applying ICT knowledge and skills to a range of situations
  • Understand and use the project life cycle
  • Critically reflect on how you and others, use ICT
  • Discuss the impact of ICT in the World
  • Consider social, economic, ethical, political and security issues regarding the use of ICT

Info about exam paper

The exam paper is broken into 3 parts:
  • Section A - Multiple choice questions
  • Section B - Systems design (based on case study)
  • Section C - Structured questions (long answers)

Theory exam paper expectations

  • State: Very brief, usually only 1 or 2 word answer
  • List: List of single words
  • Define: A statement giving the meaning of a particular term
  • Describe: A description of the feature – nothing more
  • Explain: A reason or interpretation must be given – not a description