5 minute read
Revision checklist
Topic Area What you should know
Topic Area 1: Design tools 1.1 Types of design tools • The different design tools that can be used • The components of each design tool • The advantages of each design tool • The disadvantages of each design tool • How you can create a design using one of the design tools • How to select an appropriate design tool for a specific task
Topic Area 2: Human computer interface (HCI) in everyday life 2.1 The purpose, importance and use of HCI in application area • The purpose and importance of the use of HCI in banking, embedded systems, entertainment, fitness, home appliances and retail • The advantages and disadvantages of using HCI in each application area 2.2 Hardware considerations • The different display types and sizes that an HCI can be used on • What the advantages and disadvantages of hardware considerations for using an HCI 2.3 Software considerations • How a range of different operating systems and software applications will impact on the design of an HCI • The range of digital platforms that an HCI can be used on and the impact the choice will have on the design of an HCI 2.4 User interaction methods • The range of different ways a user can interact with an HCI • The advantages and disadvantages of each user interaction method
Topic Area 3: Data and testing
3.1 Information and data • What data is • What information is SAMPLE • What the relationship is between data and information 3.2 Data use • What the different data types are that can be used • How each data type can be used • What we mean by validation and its purpose
• What we mean by verification and its purpose • The role of validation
• The role of verification
• What the different tools are that can be used for data validation
• How validation can reduce user errors
• What the different tools are that can be used for data verification
• How verification can reduce user errors
3.3 Methods of data collection
• The different primary methods of collecting data and their advantages and disadvantages • The different secondary methods of collecting data and their advantages and disadvantages 3.4 Storage of collected data • The advantages and disadvantages of storing data in a logical location • The advantages and disadvantages of storing data in a physical location • The characteristics of each internal and external storage device and their advantages and disadvantages 3.5 Application of testing to a range of contexts • Why testing is needed and the effects of not testing and its advantages and disadvantages • What each type of test data is and the role each plays • The advantages and disadvantages of technical testing and of user testing
Topic Area 4: Cyber-security and legislation
4.1 Threats used in a cyber attack • The definition of each of the following threats: denial of service (DoS), hacking (black/white/grey), malware, adware, botnet, ransomware, spyware, Trojan Horse, virus, worm, social engineering, baiting, phishing, pretexting, SAMPLE quid pro quo, scareware and shoulder surfing • Why each of the threats are used by attackers • How each of the threats are used by attackers • How each threat works
• How the methods of social engineering can be used to collect data and information
• How each of the threats can be prevented 4.2 The impact of a cyber-security attack
• What data destruction is and the impact it can have on an individual and organisation
• What data manipulation, data modification, data theft, denial of service to users and identity theft are and the impacts they can have on an individual and organisation
4.3 Prevention measures
• What each physical and each logical measure of preventing a cyber attack is and how it works • What each destruction of data method is and how it works
4.4 Legislation related to IT systems
• The purpose of the following legislation: Computer Misuse Act,
Copyright, Designs and Patents Act, Data Protection Act, Freedom of Information Act and the Health and Safety at Work Act
• What each individual/business is required to do to comply with each legislation • The implications of each of the pieces of legislation for: data and information, individuals and organisations • How each piece of legislation can be used to deal with issues relating to cyber-security
Topic Area 5: Digital communications
5.1 Types of communication • The purpose of the following digital communication methods: audio, collaboration tools, leaflets, infographics, newsletters, presentations, reports, social media, video, voice over internet protocol (VoIP) and websites • What the advantages and disadvantages are of each of the digital communication methods 5.2 Software SAMPLE • The characteristics of desktop publishing (DTP) to create digital communications • The characteristics of standard office applications to create digital communications • Software applications that can be used on PC, Mac and mobile devices
5.3 Digital devices • The characteristics of a smartphone, a smart TV, a PC/laptop, a tablet and a smartboard
5.4 Distribution channels
• The characteristics and the advantages and disadvantages of each of the following distribution channels: cloud, email, messaging, mobile apps, multimedia, VoIP and websites
• The characteristics and the advantages of each of the following connectivity methods: 4G/5G, Bluetooth technology, mobile Wi-Fi hotspots, Wi-Fi and wired
5.5 Audience demographics • The different elements of audience demographics: accessibility, age, gender and location
Topic Area 6: The Internet of Everything (IoE)
6.1 Use of IoE • What the IoE is • How the World Wide Web and the internet are used by the IoE • What each of the four pillars of the IoE are and how they interact • The advantages and disadvantages of the IoE • What we mean by the term ‘digital interactivity’: device to device and human to device • How a digital device can be tailored to meet the needs of its user 6.2 Application areas in everyday life • How the IoE can be applied to energy management, health, manufacturing, military/emergency services, smart devices (business/home/personal) and transport • The advantages and disadvantages of using the IoE in each of the different areas • The overall suitability of using the IoE in each of the different areas and also the related security issues. SAMPLE Revision checklist