Cambridge Nationals R001 Revision Guide – June 2014.

Slides:



Advertisements
Similar presentations
Term 2, 2011 Week 1. CONTENTS Sending and receiving devices Mobile devices connected to networks – Smart phones – Personal digital assistants – Hand-held.
Advertisements

Lets test YOUR knowledge!
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
1 of 13 Inputs and Outputs Using ICT. 2 of 13 You need to know about a range of computing devices including: Desktop computers Laptops Tablets Netbooks.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Essential Introduction to Computers. What is a Computer? An electronic device, operating under the control of instructions stored in its own memory, that.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
ICT SYSTEMS Inputs / Processing / Outputs. Input e.g. Data Input Any Computer System Feedback e.g. a printer problem Process e.g. A computer program Output.
Information Technology, the Internet, and You © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
Cambridge Nationals The use of wired and wireless technology to transfer information to portable devices and the benefits and drawbacks of doing so.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
The laws Organizations are covered by lots of different laws
Computers Are Your Future Eleventh Edition Chapter 1: Computers & You Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Used by employees who work remotely. Diary Management Software.
Communication Methods , or Electronic Mail, is an important part of communication within businesses and should be used effectively. An is made.
New Data Regulation Law 201 CMR TJX Video.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Local & Wide Area Networks
Case Study - Scenario 1 Austin School is one of six high schools catering for students aged between 11 and 16 years of age. Parents can select any one.
Microsoft Office 2010 Introduction to Computers and How to Purchase Computers and Mobile Devices.
Theme 2: Working smarter Topic 12: Explore portable devices and learn more about connections Chapter 1.4. Page 61 – 75 Mobile technology.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
LANs and WANs Coatbridge High School Computing Department.
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Overview of Windows and Microsoft Word. Operating System Performs 3 functions –Controls the hardware of the computer Screen, keyboard, disk drives, etc.
Section 1 Understanding how ICT can be used to meet business needs.
Microsoft Office 2007 Essential Introduction to Computers.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Collecting Data Types, coding, accuracy, file formats and the effect of data loss.
Input devices Output devices Wired Methods Ethernet ADSL Fibre Optic.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
Week Four Rouda’s Sections.  LAN - Local Area Network ◦ small area (e.g. a building) ◦ small number of machines  WAN - Wide Area Network ◦ large area.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
PC Computers or Desktop Computers: Usually a computer box or case with built In internal Hard Drive, Processor, power supply, and CD or DVD Rom hooked.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
G041: Lecture 08 ICT Infrastructure Used By Organisations Mr C Johnston ICT Teacher
ROO1REVISION LO1 How ICT can be used to meet business needs LO3 Know how ICT can be used to support business working practices LO2 Know how to work with.
Games consoles 1. What is a video game?  A computer that enables games to be played on television through digital projectors.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Policies and Security for Internet Access
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Information Systems Design and Development Technical Implications (Storage) Computing Science.
. Input 1. Make a list of a range of input devices – In twos decide how many you think you can come up with and make a bid. Teams keep bidding until.
Enw / Name. Advantages and Disadvantages of this type of network Draw / insert a drawing of a RING network What type of network would you recommend a.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Year 12: Unit 2, living in the digital world. 1. What is ICT? ICT is the use of technology to convert data to information. It covers many areas, especially.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Computers Mrs. Flowers University High School.
1.4 wired and wireless networks lesson 1
Networks.
ICT meeting Business needs
THE PYRAMID OF KNOWLEDGE
Swipe to Donate Life.
Keyboarding Class LHMS Ms. Key © Mr. Thrasher
Working with Information and Data
BTEC level 3 Learning Aim D.
G061 - Network Security.
Presentation transcript:

Cambridge Nationals R001 Revision Guide – June 2014

Information for Learners mrchapmanit.com Information for Learners Many employees work remotely from their main office with their daily routine organised for them by a manager. This manager will be responsible for scheduling the work of each employee so that the needs of the customer are best met. (Scenario 1) Customer feedback is a useful method of gauging the effectiveness of employees. (Scenario 2)

mrchapmanit.com Scenario 1 Cable Ties Ltd is a company that specialises in installing and maintaining cable television systems. The company employs seven Cable Technicians and provides each of them with a smartphone to help them complete their work. Each Cable Technician is required to sign an Acceptable Use Policy (AUP) before they are issued with their smartphone. As part of this AUP, each technician has to agree not to download any Apps other than those included with the smartphone when it is issued. At the end of each day, Jackie, the Office Controller, looks at all the jobs that have been booked and creates a work schedule for the next day for each technician. These work schedules are then remotely synchronised with the technicians’ smartphones. At the start of the day, and when a job is completed, each technician contacts the next customer on their schedule to confirm that the planned visit is still convenient. Cable Ties Ltd has some ‘priority’ customers. A call from a ‘priority’ customer must be dealt with within four hours of being received. When such a call is received, Jackie will make any necessary changes to work schedules for the day. Updated work schedules are then sent remotely to the smartphones of any Cable Technicians affected by the change.

mrchapmanit.com Scenario 2 Jackie, the office controller, wants to collect feedback from customers. She is not sure whether to ask customers to fill in a paper-based form while the technician is at their premises or to ask them to give feedback online after the technician’s visit. Jackie knows that whichever method she chooses, she will receive a lot of feedback. She would like to be able to link the feedback from each customer to the job to which it refers. Marcus has just started working for Cable Ties Ltd as a Cable Technician and his work is being monitored for his first four weeks. When he completes a job, he has to send an SMS message to Jackie, with the word ‘Done’ and the job reference. This information is then used to monitor the time that Marcus takes to complete each job.

mrchapmanit.com Preparation In order to prepare for the examination, you should find out the features of smartphones and how these can be used to support the day-to-day work of a travelling technician. This should include: the use of wired and wireless technology to transfer information to portable devices and the benefits and drawbacks of doing so how information and data can be stored on portable devices possible drawbacks of providing technicians with smartphones.

You should also research into: mrchapmanit.com You should also research into: legal and moral restrictions on the use of personal and other data methods by which personal data can be protected methods of storing data and information that is no longer required for day-to-day use methods of tracking the work of travelling technicians methods of collecting and using data about customer satisfaction the impact of the use of ICT on the efficiency of businesses.

LO1 Input, Output & Storage mrchapmanit.com LO1 Input, Output & Storage Input Devices (keyboard, mouse, microphone) Output Devices (monitor, speakers, printer) Storage Devices (hard drive, flash drive) A ‘USB’ is not any of the above – you probably mean a flash drive – and that’s storage, not input or output

LO1 Storage & Connectivity mrchapmanit.com LO1 Storage & Connectivity Storage & Connectivity Devices: Optical discs (CD & DVD) Magnetic media (Internal & External HDD, tape) Solid State Drives (SSD) Memory cards & Flash Memory Network devices (modems, routers) Cloud Storage

LO1 Smartphones Features mrchapmanit.com LO1 Smartphones Features Relate features specifically to day to day work of a travelling technician Apps Diary software, Syncing with office Methods of communication SMS, Calls, Email Advantages & Disadvantages of giving technicians smartphones

LO1 Application Software mrchapmanit.com LO1 Application Software Specifically: Communications software Web browsers Apps for portable devices

LO1 Monitoring Employees mrchapmanit.com LO1 Monitoring Employees Using GPS location tracking Monitoring internet use and comminicatons GPS and Sat Nav are not the same thing!

LO2 Data Storage File formats: Date storage technologies mrchapmanit.com LO2 Data Storage File formats: Proprietary formats: .doc, .xls, .ppt, .fla, .wma, .aac Open formats: .rft, .pdf, .csv, .exe, .txt, .mp3, .wav Date storage technologies Local and removabe media Remote storage (offsite storage, cloud storage)

LO2 Security Security measures to be taken when storing data: mrchapmanit.com LO2 Security Security measures to be taken when storing data: Network/Computer Security Usernames/Passwords Access rights/permissions Document Security Passwords Other ways to restrict access to or editing of content How and why data is encrypted Physical security to prevent loss of data/devices (e.g. locked doors)

LO2 Connectivity Be able to give definitions and uses of each: Wired: mrchapmanit.com LO2 Connectivity Be able to give definitions and uses of each: Wired: USB, Firewire, Ethernet, HDMI Wireless: Wifi, Bluetooth, Infrared

LO2 Connectivity Be able to state the benefits and drawbacks of: Wired connections Wireless connections A benefit is a good feature or an advantage. A drawback is a bad feature of a disadvantage. If you’re asked about implications, you need to look at the benefits and the drawbacks

LO2 Connectivity Mobile data transmission – 3G & 4G mrchapmanit.com LO2 Connectivity Mobile data transmission – 3G & 4G Remote methods – Email, Internet, Cloud, P2P Security methods – data encryption How the following impacts choice of method: File size, transfer speed, future-proofing, data security, user needs Factors effecting transfer speed: Bandwidth, router, technology

mrchapmanit.com LO2 Connectivity Factors affecting the appropriate optimisation of electronic files (e.g. download speeds, quality of product) How to connect a computing device to an existing wireless network: Network name – SSID Use of security keys Firewalls for public and private networks

LO2 Data Capture Methods mrchapmanit.com LO2 Data Capture Methods Online & Paper-Based Forms Automated Data Capture: control system sensors, barcode readers, RFID, NFC How can following factors affect choice of method: Nature of information to be collected, cost, availability, ease of use, data security

LO2 Data Capture Methods mrchapmanit.com LO2 Data Capture Methods How to design data capture forms to obtain specific information How to code information for use in spreadsheet or database Data validation methods

LO2 Storing Data How to use backup and recovery systems: mrchapmanit.com LO2 Storing Data How to use backup and recovery systems: Data storage media, backup frequency, archiving, automated vs manual systems How the following factors can affect the choice of method: Cost, ease of use, availability, data security

LO3 Diary Management (DMS) mrchapmanit.com LO3 Diary Management (DMS) What is DMS? What can DMS do? Appointments, reminders, syncing How is DMS accessed? Mobile app/cloud Closed/open – Access Rights

LO3 & LO4 Smartphone Drawbacks mrchapmanit.com LO3 & LO4 Smartphone Drawbacks Consider: How organisations monitor employees: GPS location tracking, monitoring internet use, monitoring communications How legislation effects business computer users: Health & Safety, Data Protection, Copyright, Computer Misuse

LO3 & LO4 Smartphone Drawbacks mrchapmanit.com LO3 & LO4 Smartphone Drawbacks Moral and ethical issues: Use and abuse of personal and private data Cyberbullying Monitoring individuals

LO3 & LO4 Smartphone Drawbacks mrchapmanit.com LO3 & LO4 Smartphone Drawbacks Implications and consequences for organisations of data loss: Legal implications Impact on customer Impact on employees Impact on organisation

LO4 Legislation Computer Misuse Act Health and Safety at Work Act mrchapmanit.com LO4 Legislation Computer Misuse Act Health and Safety at Work Act Data Protection Act Copyright, Designs and Patents Act

LO4 Monitoring Individuals mrchapmanit.com LO4 Monitoring Individuals CCTV Swipe or RFID cards Key logging Mobile phone triangulation Cookies Call monitoring / recording Electronic consumer surveillance (loyalty cards)

LO4 Acceptable Use Policies mrchapmanit.com LO4 Acceptable Use Policies What are they? What might they include? Relate to legal, moral and ethical