WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
WHAT D IS RAW, UNPROCESSED FACTS AND FIGURES COLLECTED, STORED AND PROCESSED BY COMPUTERS.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
INFORMATION TECHNOLOGY
ONLINE DATA STORAGE & DOCUMENTS Lesson 3. Lesson 3 – Online documents In this lesson we will be covering:  Online documents  Compression and expansion.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Networking Computers. Advantages & Disadvantages of Networking.
Technology ICT Option: . Electronic mail is the transmission of mainly text based messages across networks This can be within a particular.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Describe the following features of LAN’s, WAN’s, and the internet: transmission media, bandwidth, geographical spread and functions. Description of a.
Module Designing Computer-based Information Systems
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
LANs and WANs Coatbridge High School Computing Department.
Section 6 Theory Software Copyright, Viruses and Hacking.
1. Outline 4 functions of a typical operating system of a PC(4) Resource management Operating systems organise how to: Load programs from backing storage.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Client-Server & Peer-to-Peer Networks
Security and backups GCSE ICT.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
NETWORK SERVERS Oliver Topping (with a little help from my Mum)
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Section 4 – Computer Networks Setting up a small network.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Objectives of Control The objectives of control are:  To ensure that all data are processed  To preserve the integrity of maintained data  To detect,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Internet Safety Internet Safety LPM
Database Management Systems (DBMS)
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Communications & Networks National 4 & 5 Computing Science.
Information Technology Essentials Deloris Y. McBride.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 01 Introduction to Computer Networking.
Mr C Johnston ICT Teacher G055 - Lecture 01 Introduction and Benefits of Computer Networks.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
NETWORKS (2) Mr Conti Lesson 2. Learning Objectives  By the end of this presentation we will have learned:  what a network is  the advantages and disadvantages.
Physical Security Concerns for LAN Management By: Derek McQuillen.
What is a Computer An electronic, digital device that stores and processes information. A machine that accepts input, processes it according to specified.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Scientific data storage: How are computers involved in the following?
Information Systems Design and Development Security Precautions Computing Science.
1 Files and databases Suppose a school stores information about its students on record cards. Each student has their own card; this is their record. Record.
( ) 1 Chapter # 8 How Data is stored DATABASE.
Networks : What is a network? A Network is formed when 2 or more computers (devices) are linked together. Every computer or device on a network can send.
Client-Server & Peer-to-Peer Networks
Technology ICT Option: .
Computer Networks Lesson 1.
Security of Data  
Technology ICT Option: .
ONLINE SECURE DATA SERVICE
Computer Networks Lesson 1.
There are two different types of computer network:
Objectives Explain the role of computers in client-server and peer-to-peer networks Explain the advantages and disadvantages of client- server and peer-to-peer.
G061 - Network Security.
Presentation transcript:

WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the requirements of the exam to achieve a grade B or above Be able to understand the requirements of the exam to achieve a grade C

WHAT Exam Practice HOW All MUST Most SHOULD Some COULD Be able to answer the exam questions in AMBER Be able to answer the exam questions in GREEN Be able to answer the exam questions in RED Differentiation: Students work in differentiated groups, activities are allocated accordingly, task explanation, key words/info around room,, group/pair work, prior knowledge, resources.

WHAT Topic: The Digital Divide CONNECT Self Assess – How much do you know about answering exam questions? How CONFIDENT are you?

ACTIVATE TOP Pick 3 key points FOR and AGAINST INTERNET WHAT Exam Practice

WHAT DEMONSTRATE Exam Practice 1.What is data logging? [2 marks] Answer: The collection and storage of data from sensors, and its storage and processing by a computer.

WHAT DEMONSTRATE Exam Practice 2. Computer systems can be protected using physical security and software security. Explain, with reference to examples, what each type of security is. [4 marks] Answer: Physical security concerns things that prevent physical access to a building, room or computer, or prevent physical damage to a computer such as by fire or flood. For example this includes locking a room to prevent theft of computer hardware and installing smoke detectors to prevent damage by fire. Software security is designed to make sure that only authorised people can access a computer system. For example, this includes making use of User-IDs and passwords, allowing access to certain files and areas - just as is used in school networks.

WHAT DEMONSTRATE Exam Practice 3. What is the difference between data and information? [4 marks] Answer: Data is the raw facts and figures in a form before processing by the computer - a human being would find it difficult or impossible to understand data. Information is produced after processing - a human being is able to read and understand information.

WHAT DEMONSTRATE Exam Practice 4. Describe three advantages of a small office using a LAN rather than three stand-alone machines. [4 marks] Answer: LAN stands for Local Area Network If all users are on a network together it is easy to share files and resources. This means a printer can be shared - all users could print to it. In addition, software can be shared, and more than one individual can use data at the same time. A LAN thus allows efficient use of the office resources - for example all work could be stored on a server allowing easier access, security and safer, more centralised backup.

WHAT DEMONSTRATE Exam Practice 5. What is the difference between data verification and data validation? [4 marks] Answer: Verification is checking the accuracy of data entry - either manually or automatically Validation is a check performed by a computer program to make sure the data is allowable

WHAT DEMONSTRATE Exam Practice 6. Jo is interested in family history - how can this help her understand the grandfather-father-son backup principle? [4 marks] Answer: The grandfather-father-son principle is used to make backups more useful and secure. Three generations of files are kept i.e. the last three versions - the newest version being the 'son'. As new versions are created the process rolls on, so the son becomes the father, the father becomes the grandfather.

WHAT DEMONSTRATE Exam Practice 7. What offences does the Computer Misuse Act, 1990 deal with? [3 marks] Answer: Hacking - unauthorised access to any program or data held on a computer - maximum fine of £2000 or six-months in prison. Computer fraud and blackmail - unlimited fine and a maximum five-year prison sentence. Viruses - unauthorised modification of a the contents of a computer, damaging the operation of a program or affecting the reliability of data. Penalty is an unlimited fine and maximum of five-year prison sentence.

WHAT Topic: The Digital Divide CONSOLIDATE Self Assess – How much do you know about answering exam questions? How CONFIDENT are you now?

WHAT DEMONSTRATE Exam Practice 8. By giving a suitable example for each, explain what is meant by: a. Field, b. Record, c. File [6 marks] Answer: A file is the name for a collection of related database records - such as the all the details for students at a school. A record is the name for related information about one thing or individual - such as the details of one individual student at a school. A field is one item of data on a record - such as the postcode of the individual student at a school. A file contains a collection of records, and a record contains a collection of fields.

WHAT DEMONSTRATE Exam Practice 9. What is meant by a 'check digit' - explain two real life examples where check digits are used. [4 marks] Answer: A check digit is a number placed at the end of a string of numbers to check that they have all been correctly input into the computer. Check digits are used with bank account numbers, ISBN numbers (used on books) - anywhere where potentially troublesome long numbers may be entered.

WHAT DEMONSTRATE Exam Practice 10. Harry is concerned that has something to do with sending inappropriate substances through the post. Why is he mistaken? [4 marks] Answer: stands for electronic mail - the most traditional way of sending messages on the internet. Using software (such as Outlook or Eudora) or an online interface (such as Hotmail and Gmail) the user types their message and presses send. The is then sent over the internet to the recipient's inbox - unique to their address. When they next log-on to their they receive the message.

WHAT DEMONSTRATE Exam Practice 11. All computer systems make use of an operating system. Explain three tasks that an operating system performs [6 marks] Answer: An operating system does many things - the main purpose is to allow applications software to interact with computer software. You then need to mention three of the following: Allow applications to print, save or open files. Organises where data is saved on disk drives. Provides security features such as handling passwords. Manages data travelling to and from peripherals such as a scanner or a mouse.

WHAT DEMONSTRATE Exam Practice 12. Name both an advantage and a disadvantage of coding data in a database field [2 marks] Answer: Advantage: File size - using coding will reduce the overall size of the database making it efficient to search and update. A disadvantage is that the coding may become confusing and be difficult to update and understand.

WOW, HOW, NOW yourself: How many questions did you answer and at what level? What questions have you not done or found hard? What will you do now to prepare you for these questions in the exam? WHAT CONSOLIDATE Exam Practice

WHAT DEMONSTRATE Exam Practice Extension Activity – Self Assess Now practice further by clicking on the link and setting your level to answer more exam questions which are interactive questions and marked straight away: Select level and start test!

Your own knowledge WHAT CONSOLIDATE What you know/understand? What do you need to read up on/revise more of? Exam Practice

WHAT DEMONSTRATE Exam Practice Open PowerPoint: G:\ICT\year 9\Year 9 ICT GCSE\AQU\ ExamPractice Use the exam questions and the resources around you to: Research the answers Answer them WOW your work NOW – plan for revision – what will you do to support your learning? All MUST Research and Complete at least half of the exam questions

WHAT CONSOLIDATE What you know/understand? What do you need to read up on/revise more of? Exam Practice