4 minute read

Revision checklist

Topic Area What you should know

Topic Area 1: Design tools • The different design tools that can be used

• The components of each design tool

• The advantages of each design tool

• The disadvantages of each design tool

• How you can create a design using one of the design tools

• How to select an appropriate design tool for a specific task

Topic Area 2: Human computer interface (HCI) in everyday life • The purpose and importance of the use of HCI in banking, embedded systems, entertainment, fitness, home appliances and retail • The advantages and disadvantages of using HCI in each application area • The different display types and sizes that an HCI can be used on • What the advantages and disadvantages of hardware considerations for using an HCI • How a range of different operating systems and software applications will impact on the design of an HCI • The range of digital platforms that an HCI can be used on and the impact the choice will have on the design of an HCI • The range of different ways a user can interact with an HCI • The advantages and disadvantages of each user interaction method

Topic Area 3: Data and testing

• What data is • What information is • What the relationship is between data and information DRAFT • What the different data types are that can be used • How each data type can be used • What we mean by validation and its purpose • What we mean by verification and its purpose • The role of validation • The role of verification

• What the different tools are that can be used for data validation

• How validation can reduce user errors

• What the different tools are that can be used for data verification

• How verification can reduce user errors

• The different primary methods of collecting data and their advantages and disadvantages

• The different secondary methods of collecting data and their advantages and disadvantages

• The advantages and disadvantages of storing data in a logical location

• The advantages and disadvantages of storing data in a physical location

• The characteristics of each internal and external storage device and their advantages and disadvantages

• Why testing is needed and the effects of not testing and its advantages and disadvantages

• What each type of test data is and the role each plays • The advantages and disadvantages of technical testing and of user testing

Topic Area 4: Cyber-security and legislation

• The definition of each of the following threats: denial of service (DoS), hacking (black/white/grey), malware, adware, botnet, ransomware, spyware, Trojan Horse, virus, worm, social engineering, baiting, phishing, pretexting, quid pro quo, scareware and shoulder surfing • Why each of the threats are used by attackers • How each of the threats are used by attackers DRAFT • How each threat works • How the methods of social engineering can be used to collect data and information • How each of the threats can be prevented • What data destruction is and the impact it can have on an individual and organisation

• What data manipulation, data modification, data theft, denial of service to users and identity theft are and the impacts they can have on an individual and organisation

• What each physical and each logical measure of preventing a cyber attack is and how it works

• What each destruction of data method is and how it works

• The purpose of the following legislation: Computer Misuse Act,

Copyright, Designs and Patents Act, Data Protection Act, Freedom of Information Act and the Health and Safety at Work Act

• What each individual/business is required to do to comply with each legislation

• The implications of each of the pieces of legislation for: data and information, individuals and organisations

• How each piece of legislation can be used to deal with issues relating to cyber-security

Topic Area 5: Digital communications

• The purpose of the following digital communication methods: audio, collaboration tools, leaflets, infographics, newsletters, presentations, reports, social media, video, voice over internet protocol (VoIP) and websites • What the advantages and disadvantages are of each of the digital communication methods • The characteristics of desktop publishing (DTP) to create digital communications • The characteristics of standard office applications to create digital communications • Software applications that can be used on PC, Mac and mobile devices • The characteristics of a smartphone, a smart TV, a PC/laptop, DRAFT a tablet and a smartboard • The characteristics and the advantages and disadvantages of each of the following distribution channels: cloud, email, messaging, mobile apps, multimedia, VoIP and websites • The characteristics and the advantages of each of the following connectivity methods: 4G/5G, Bluetooth technology, mobile Wi-Fi hotspots, Wi-Fi and wired

• The different elements of audience demographics: accessibility, age, gender and location

Topic Area 6: The Internet of Everything (IoE) • What the IoE is

• How the World Wide Web and the internet are used by the IoE

• What each of the four pillars of the IoE are and how they interact

• The advantages and disadvantages of the IoE

• What we mean by the term ‘digital interactivity’: device to device and human to device

• How a digital device can be tailored to meet the needs of its user

• How the IoE can be applied to energy management, health, manufacturing, military/emergency services, smart devices (business/home/personal) and transport

• The advantages and disadvantages of using the IoE in each of the different areas

• The overall suitability of using the IoE in each of the different areas and also the related security issues.

DRAFT

This article is from: