WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

GCSE ICT Networks & Security..
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Frank Wood and Alan Sangster, Frank Wood’s Business Accounting 1, 12 th Edition, © Pearson Education Limited 2012 Slide 22.1 Chapter 22 Computers and accounting.
The Data Protection (Jersey) Law 2005.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Data Protection Overview
The Data Protection Act
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Information Governance Jym Bates Head of Information Assurance.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Health & Social Care Apprenticeships & Diploma
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Section 6 Theory Software Copyright, Viruses and Hacking.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
The Data Protection Act 1998 The Eight Principles.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Slide 1 St Andrew’s High School Standard Grade Computing Databases Standard Grade Computing Studies.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Computing and Information Science 1 Databases START.
Information Systems Unit 3.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
DATA PROTECTION ACT INTRODUCTION The Data Protection Act 1998 came into force on the 1 st March It is more far reaching than its predecessor,
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
( ) 1 Chapter # 8 How Data is stored DATABASE.
The Data Protection Act 1998
Data Protection GCSE ICT Mrs N Steventon-2005.
Handling Personal Data
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Types of Software.
Legislation in ICT.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the requirements of the exam to achieve a grade B or above Be able to understand the requirements of the exam to achieve a grade C

WHAT Exam Practice HOW All MUST Most SHOULD Some COULD Be able to answer the exam questions in AMBER Be able to answer the exam questions in GREEN Be able to answer the exam questions in RED Differentiation: Students work in differentiated groups, activities are allocated accordingly, task explanation, key words/info around room,, group/pair work, prior knowledge, resources.

WHAT Topic: The Digital Divide CONNECT Self Assess – How much do you know about answering exam questions? How CONFIDENT are you?

ACTIVATE TOP Pick 3 key points FOR and AGAINST WIFI WHAT Exam Practice

WHAT DEMONSTRATE Exam Practice 1.Liquid crystal displays are now much more popular with computer users - give two reasons why they are popular for desktop systems. [2 marks] Answer: LCD monitors take up much less space on the user's desk. The quality of image is sharper and more defined In terms of design, individuals find LCD screen more 'stylish' - with computers becoming more and more common in homes the visual impact is now more significant.

WHAT DEMONSTRATE Exam Practice 2. On Kelly's school network, each time a member of staff makes changes to the student database, a transaction log is kept. What is the purpose of a transaction log?[4 marks] Answer: Transaction logs record alterations that are made together with the user-ID of the person making them. This allows the changes to be tracked back to a specific individual.

WHAT DEMONSTRATE Exam Practice 3. What are the advantages of using data capture to enter and record lottery numbers? [2 marks] Answer: Readings are taken automatically, so they are much more accurate. Large numbers of tickets can be processed very rapidly, and the data can be passed to a central database automatically.

WHAT DEMONSTRATE Exam Practice 4. What activities does the Copyright, Designs and Patents Act, 1989 cover? [3 marks] Answer: Stealing software. Using illegally copied software and manuals. Running unlicensed software (e.g. purchasing a licence for two computers but running the software across an entire school network).

WHAT DEMONSTRATE Exam Practice 5. Explain the main principals of the Data Protection Act, [8 marks] Answer: There are (obviously) eight points to mention! Data must be processed fairly and lawfully. Data must be obtained for specified and lawful purposes. Data must be adequate, relevant and not excessive for the purpose. Data must be accurate and up to date Data must not be kept longer than necessary Must be processed within the rights of data subjects. Be kept secure against loss, damage and unauthorised and unlawful processing. Not be transferred to countries outside the European Economic Area.

WHAT DEMONSTRATE Exam Practice 6. What is the difference between analogue and digital signals? [4 marks] Answer: Analogue signals are represented by signals that vary between a predefined range. Digital signals are electrical on or off signals, represented as binary digits as either on (1) or off (0).

WHAT DEMONSTRATE Exam Practice 7. Give the names of four fields other than name, address and telephone number that a golf club might use for its Members database [4 marks] Answer: Member number Date of birth Handicap (their rating as a golfer). Date of joining the club

WHAT Topic: The Digital Divide CONSOLIDATE Self Assess – How much do you know about answering exam questions? How CONFIDENT are you now?

WHAT DEMONSTRATE Exam Practice 8. Why do some people suggest that Internet access should be carefully controlled?[4 marks] Answer: To prevent illegal (e.g., racist or pornographic) material being readily available. To prevent young children accessing unsuitable material. To make the Web more useful - much of the internet is unwanted info To protect the rights of copyright owners. To reduce lost working time by restricting access to online games, holiday sites and chat rooms.

WHAT DEMONSTRATE Exam Practice 9. What is a password - and why should it be changed regularly? [3 marks] Answer: A password is a string of characters chosen by a computer user to protect access to their area. Passwords should not obvious (i.e. easily guessable) and should be changed regularly just in case someone has discovered the password. Changing the password regularly keeps the password and access to the user area or files more secure.

WHAT DEMONSTRATE Exam Practice 10. What is a 'utility program'? Explain some of the functions that 'utility programs' carry out. [4 marks] Answer: Utility programs are often part of an operating system, but can also be purchased separately. Utility programs perform common tasks such as: [Any three of the following] Repairing damaged files Detecting and removing viruses Dealing with spyware Formatting disks Listing files Copying files Copying disks Renaming files Backing up files Searching for particular files

WHAT DEMONSTRATE Exam Practice 11. What does a microprocessor in a washing machine do? [6 marks] Answer: A microprocessor is a processor embedded into many products like washing machines. The machine is pre-programmed to perform specific tasks such as precise timings. Embedded systems are small and reliable. Microprocessors can even be reprogrammed.

WHAT DEMONSTRATE Exam Practice 12. Explain two threats to computer systems that software security protects against. [2 marks] Answer: Viruses - Virus scanning software attempts to protect a computer against viruses Spyware and rogue-diallers - can be downloaded without the user's knowledge while on the internet. This can include key-logging software (that track passwords and sensitive data typed in) and spyware which can take over a system tracking a user's actions against their knowledge. Anti-spyware software attempts to prevent the user's data by blocking spyware or rogue dialler software

WOW, HOW, NOW yourself: How many questions did you answer and at what level? What questions have you not done or found hard? What will you do now to prepare you for these questions in the exam? WHAT CONSOLIDATE Exam Practice

WHAT DEMONSTRATE Exam Practice Extension Activity – Self Assess Now practice further by clicking on the link and setting your level to answer more exam questions which are interactive questions and marked straight away: Select level and start test!

Your own knowledge WHAT CONSOLIDATE What you know/understand? What do you need to read up on/revise more of? Exam Practice

WHAT DEMONSTRATE Exam Practice Open PowerPoint: G:\ICT\year 9\Year 9 ICT GCSE\AQU\ ExamPractice Use the exam questions and the resources around you to: Research the answers Answer them WOW your work NOW – plan for revision – what will you do to support your learning? All MUST Research and Complete at least half of the exam questions

WHAT CONSOLIDATE What you know/understand? What do you need to read up on/revise more of? Exam Practice