ICT - Unit 1 LO2 - Personalised Learning Checklist

Page 1

Student Name: ___________ Grade Awarded by: __n/a__ Date Awarded: _____n/a___ Grade: PASS/MERIT/DISTINCTION

OCR Cambridge TEC (Introductory Diploma) in IT Spec 2016

Unit 1 – Fundamentals of

IT (Exam unit)

Unit 01 LO2 – Personalised Learning Checklist topic

Secure ?

ACTIVITIES Produce a TABLE that IDENTIFIES different TYPES of these software and their CHARACTERISTICS

2.1 TYPES OF SOFTWARE

Open source Freeware

Closed source Embedded

Off the shelf

Bespoke

Characteristics of each of 7 types of software

Uses of each of 7 types of software

Shareware

Justification of each of 7 types of software within a given context

Produce a TABLE that IDENTIFIES different APPLICATIONS software and their PURPOSE, ADVANTAGES & DISADVANTAGESLO2

2.2 APPLICATIONS SOFTWARE

PRODUCTIVITY SOFTWARE (word processor, spreadsheet, database, email, etc) PURPOSE FOR EACH OF THE APPLICATIONS SOFTWARE

DEVELOPMENT TOOLS (compiler,

BUSINESS SOFTWARE

debugger, translator, integrated design environment, etc)

(MIS, multimedia, collaboration, project management, manufacturing, CAD/CAM, publishing, expert systems, healthcare, etc)

ADVANTAGES of each applications software

DISADVANTAGES of each applications software

Produce a TABLE that IDENTIFIES different UTILITIES software and their PURPOSE, ADVANTAGES & DISADVANTAGESLO2 2.3 UTILITY SOFTWARE 2.4 OPERATING SYSTEMS 2.5 functions 2.6 Benefits & Limitations

2.7 COMMUNICATION METHODS

2.8 SOFTWARE TROUBLESHOOTING

2.9 PROTOCOLS

BACKUP

ANTI-VIRUS

COMPRESSION

PURPOSE OF EACH OF THESE 3 ADVANTAGES of each UTILITY software DISADVANTAGES of each UTILITY software UTILITIES SOFTWARE Produce a TABLE that IDENTIFIES different OPERATING SYSTEMS and their KEY FUNCTIONS, BENEFITS & LIMITATIONSLO2 SINGLE PROCESSOR/MULTISINGLE USER/MULTI-USER OFF THE SHELF/OPEN SOURCE/BESPOKE OS PROCESSOR Key Functions of each OS

BENEFITS of each OS

LIMITATIONS of each OS

Produce a TABLE that IDENTIFIES different COMMUNICATION methods used within a business context and their CHARACTERISTICS, ADVANTAGES & DISADVANTAGESLO2 MESSAGING SMS EMAIL SOCIAL NETWORKING VoIP SOFTWARE PERSONAL ASSISTANTS VIDEO TELECONFERENCE CELLULAR/SATELLITE INSTANT MESSAGING (eg. SIRI, CORTANA) CONFERENCE CHARACTERISTICS of each of 10 ADVANTAGES of each of 10 COMMUNICATION DISADVANTAGES of each of 10 COMMUNICATION METHODS COMMUNICATION METHODS METHODS Produce a TABLE that IDENTIFIES different types of COMMON SOFTWARE FAULTS, TOOLS used to INVESTIGATE them, the DOCUMENTATION involved to LOG these SOFTWARE FAULTS, WHY different TROUBLESHOOTING TOOLS are used in DIFFERENT CONTEXT and the JUSTIFICATION for their use. DOCUMENTATION to log SOFTWARE COMMON FAULTS TROUBLESHOOTING TOOLS to FAULTS AND SOLUTION (unexpected software behaviour, INVESTIGATE a PROBLEM (LOGS, ONLINE REPORTS for future software freeze, unexpected rebooting) (logs, installable tools, baselines) reference for similar faults) WHY different TROUBLESHOOTING JUSTIFICATIONS for the use of different TROUBLESHOOTING tools are used in different contexts tools are used in discussed. different contexts Produce a TABLE that IDENTIFIES different PROTOCOLS, their FEATURES, PURPOSE and COMMON USAGE in given context. What is PROTOCOL? (a system of RULES for a telecommunication connection that specifies interactions between the communicating entities) IP (Internet TCP (Transmission UDP (User Datagram SMTP FTP HTTP Protocol) Control Protocol) Protocol) Common usage SNMP ICMP POP FEATURES of each of 9 protocol PURPOSE of each scenarios


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.