Download presentation
Presentation is loading. Please wait.
Published byBertram Harrington Modified over 9 years ago
1
Level 4 and Level 5
2
What is Covered in the Unit Effective use of Folders and Files. Effective use of Microsoft Word. Effective use of Microsoft PowerPoint. Effective use of Microsoft Excel Spreadsheets. Accessing Information using ICT. Effective use of Email. Computer and Internet Safety
3
Effective Use Folders and Files. Creation of folders with appropriate names. Creation of sub-folders. Appropriate naming of saved files.
4
Effective Use of Microsoft Word. Layout and use of software ribbon. Use of software help function. Use of different text fonts and font size. Use of ‘bold’, ‘underline’, ‘sub and superscript’. Use of headers and footers. Use of page numbering. Inserting page breaks. Inserting tables and adding columns or rows. Inserting of images, hyperlinks and photographs.
5
Effective Use of Microsoft PowerPoint. Layout and use of software ribbon. Use of software help function. Use of different text fonts and appropriate font sizes. Use of headers and footers. Use of page numbering. Inserting new slides. Inserting text boxes. Inserting of images, audio files and photographs. Inserting hyperlinks.
6
Effective Use of Microsoft Spreadsheets. Layout and use of software ribbon. Use of software help function. Use of different text fonts and appropriate font sizes. Use of headers and footers. Use of page numbering. Use of simple and complex formula. Inserting and deleting columns and rows. Creation of graphs.
7
Accessing Information using ICT Locate and integrate information for ICT sources. Thinking of initial strategy to allow quicker and more accurate searches. Choice of key words to filter out unwanted sources. Moving of data from one ICT source to another. Evaluation of information found and sources accessed. Evaluation of the search strategy, to decide on its success and production of matching search criteria.
8
Effective Use of Emails. Inserting of subject. Inserting of content. Attaching documents etc. Selecting address for recipient.
9
Computer and Internet Safety Data security using System login. Passwords. Virus protection. Data back-ups.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.