 Collect your past paper  Collect a starter sheet – do it as your computer is logging on.

Slides:



Advertisements
Similar presentations
Introduction to Functional Skills ICT module. Aims and Objectives Lesson Aim 1. To increase understanding and confidence in what level of ICT competence.
Advertisements

Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Stole it Straight from Wilkes County. Questions from 1.01.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Perimeter and Area The following questions come from past GCSE examination questions (Higher Tier).
Factors to be taken into account when designing ICT Security Policies
The following questions come from past GCSE exam papers (Higher Tier).
Help ICT GCSE HARDWARE AND SOFTWARE Start Help HOW TO PLAY: When you click the start button you must enter your name before you start answering the questions.
Lets “Bee Buzzy” with Addition! By: Miss Ballard.
Data: A collection of raw facts and figures. It may consist of numbers, characters, symbols or pictures. Information: Organized and processed form of.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Introduction to Computers and the Internet. What is a computer? An "intelligent" machine  You tell a person to do a job and the person follows your “instruction”
Administrative Practices Outcome 1
A-Level ICT Presented by: Mr Hunter. Things you probably want to know? How well do people do in ICT? How well do people do in ICT? What will my tutors.
IT Security for Users By Matthew Moody.
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
Components of a computer system. Learning Objectives
Computer and Networking Basics Review Make a review sheet by numbering as shown below. The test is timed. You can practice again if needed. Click the mouse.
Heba Daraghmeh 27/6/2010 Basic Computer Terminology.
Computer Software Computer Technology Day 5. Software  Provides step-by-step instructions that tell the computer how to perform  Categories  System.
Mr Conti 24th March 2014 Lesson Aim To learn a basic computer system and explore Input devices in real life situations. Lesson Outcomes Good – will understand.
Section 1 Understanding how ICT can be used to meet business needs.
Computer Parts Hardware.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Computer A computer is an electronic machine that takes information, processes it,and stores it. Computers are made up of hardware ( monitor, tower, keyboard,
Keywords: BTEC IT, Subsidiary Diploma, Storyboard, House Style, Web Production, Peer Assessment Lesson Objectives: You will be able to DESIGN a Website.
BTT1O Unit 1 Review.
LOG ONTO YOUR COMPUTER USE THE FOLLOWING LOGON IF YOURS DOES NOT WORK: USERNAME: PASSWORD: GO TO:
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Computer Quiz Beginners ICT Start. Created by Malcolm Fowler Select an input device from the list? Q1 1 Mouse 2 Speaker 3 Monitor 4 Hard drive Next question.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
By Dinesh Bajracharya Nepal Components of Information system.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Parts of a Computer Computer Hardware Hardware refers to the physical parts that make up the computer. Let’s name the computer hardware parts that we.
Unit 8.5 Lesson 1 Databases Murder at Highfield High Start/Computer/Central Resources/ Future Skills/Computer Science/ Year 8 / 8.5 Databases - Copy Unit.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
 Revise/Learn terminology to do with training using (5 mins)  REMEMBER to use Internet Explorer.
 Hardware versus Software Hardware versus Software  How a computer works How a computer works  Introduction to Windows Introduction to Windows  What.
Hardware  From input devices ………………., ……………….. while output devices, such as ………………., …………………….  ………….., …………., ………… and……………..make computer powerful.
Lesson 3 Human Computer – Part 2 To understand the term “back-up” and why it is needed To explore the different methods of data storage and how we can.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
1 AQA ICT AS Level © Nelson Thornes 2008 Operating Systems What are they and why do we need them?
 Create a folder called “Unit 8”  Open a Word document called “Communication” and save it in the folder  Add the learning objectives: ◦ To review:-
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Applications Sharing Computer Literate.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Key Stage Three Key Stage Three Revision Materials Top Tips
Input, Output, and Specialist Devices
Information & Software Technologies
Additional hardware components, and Embedded Systems
Administrative Practices Outcome 1
Preparation for the exam!
Data Logging 1 WJEC ICT.
Revision Case study and revision material from BHBS staff
Basic Computer Components
Mr C Johnston ICT Teacher
Inputs and Outputs.
TBD Investments-Program Module
YEAR 7 PROGRAMMING SCRATCH & E-SAFETY UNIT WRAPPER
Encryption and Hacking
Types of Software.
GCSE AQA Revision Paper 1 Additional Questions Mark scheme V1.0.
Part 3 Q11 to Q15 of National 5 Prelim
EOTT Today is the EOTT for the topic we have been working on.
 starter activity How accurate is this portrayal of US – Soviet relations at the height of the arms race? How can you score maximum marks on cartoon source.
ICT and Learning Unit 1 GCSE ICT.
Presentation transcript:

 Collect your past paper  Collect a starter sheet – do it as your computer is logging on

 Review the past paper – take notes of what you needed to improve  Most common mistake was not linking the answer to the scenario – general comments will only get half marks

 Complete the starter sheet

 June 10 1(a)(i) ◦ Mouse and Keyboard  Jan 12 1(a)

1. Finish the Input/Storage/Output task sheet 2. Answer the “Edachild” question 3. Go to teach ICT and play any of the input, output or storage games ict.com/gcse_new/gcse_ict_quizzes.htm

 understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally and externally) including virus protection software, firewalls, passwords, encryption of documents and screen-savers.

 Go to BBC Bitesize, Click on GCSE, Click on ICT  Click on Data, information and databases  Watch the “Activity” and read the “Revise” and take notes  Do the test  Bring in your NOTES and 9 out of 9 on the test