IT is Grade 10
|
|
- Anis Young
- 5 years ago
- Views:
Transcription
1 IT is Grade 10 Ulza Wassermann Chris Noomé Edward Gentle Keith Gibson Pam Macmillan Malie Zeeman i
2 iimodule Published by Study Opportunities PO Box 52654, Dorandia, 0188 Tel: (012) Fax: (012) November 2011 ISBN: Study Opportunities Copyright strictly reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or by any information storage or retrieval system, without permission in writing from the publisher. DTP, layout and design by Ronelle Oosthuizen Cover design by Suzanne Jacobs Printed by Intrepid Printers (Pty) Ltd 7572
3 Contents Introduction... 1 Section 1 Algorithm Design and Programming...7 Module 1.1 Thinking for computers...8 Module 1.2 Introduction to graphical programming...25 Module 1.3 Input, processing, output...43 Module 1.4 Decision making...59 Module 1.5 Interaction between sprites...75 Module 1.6 Lists...83 Module 1.7 Prevent and find errors...90 Module 1.8 Projects...95 Section 2 Systems Technologies Module 2.1 Basic concepts of computing Module 2.2 Basic concepts of hardware Module 2.3 Basic concepts of system software Module 2.4 Computer management Module 2.5 Improve your browser Section 3 Communication and Internet Technologies Module 3.1 Networks Module 3.2 Electronic communication Module 3.3 Internet and Module 3.4 Web page technology iii
4 Module Section 4 Data and Information Management Module 4.1 Data as the computer sees it Module 4.2 File management Section 5 Social Implications Module 5.1 Social, ethical and legal issues surrounding ICTs Module 5.2 Green, health and global e-communication issues Module 5.3 Safe Internet and use Appendix Connectors on a computer iv
5 Table of contents Introduction... 1 Section 1 Algorithm Design and Programming...7 Module 1.1 Thinking for computers...8 Computers and thinking...8 Create a solution for a problem...9 Algorithms for simple mathematical problems...15 Algorithms with decisions...19 Algorithms with repetition...21 Module 1.2 Introduction to graphical programming...25 Gather your resources...25 Get to know the Scratch environment...26 Teach a sprite to perform basic tasks...29 Teach a sprite to repeat actions...32 Create animation...35 Module 1.3 Input, processing, output...43 Introduction...43 Teach a sprite to remember by using variables...43 Teach a sprite to do calculations with numbers...47 Teach a sprite to handle strings...54 Module 1.4 Decision making...59 Introduction...59 Decision-making in Scratch...59 Decide when to terminate the loop...71 Decide when to enter the loop...73 Module 1.5 Interaction between sprites...75 Broadcasting and receiving messages...75 Two sprites communicate by sharing data...79 Module 1.6 Lists...83 Representation of a list...83 Create a new list...83 Program blocks for lists...84 Store items in a list...84 Module 1.7 Prevent and find errors...90 Data validation...90 Debugging your program...92 Module 1.8 Projects...95 Special effects...95 The importance of planning...95 The final touches...96 Follow the design of a coin toss game...97 Flags and interactive elements v
6 Section 2 Module Systems Technologies Module 2.1 Basic concepts of computing What is a computer? An expanded model of a computer The role of software Types of computers ICT systems Module 2.2 Basic concepts of hardware Inside the case of a computer Connecting to the computer Peripherals Smartphones versus computers Module 2.3 Basic concepts of system software Introduction Operating system Utility programs Device drivers Module 2.4 Computer management Introduction Initial maintenance Ongoing maintenance Adding and removing software and hardware Other housekeeping tasks Module 2.5 Improve your browser Modular software Browser plug-ins Section 3 Communication and Internet Technologies Module 3.1 Networks What is a network? Reasons for having a network Disadvantages of having a network Components of a network Types of networks Client-server vs. peer-to-peer LAN Access control when logging into a network Module 3.2 Electronic communication Applications to facilitate e-communication Practical use of Module 3.3 Internet and What is the Internet? What is needed to connect to the Internet? The World Wide Web vi
7 Module 3.4 Web page technology Introduction What is a web page? HTML Basic formatting tags Characteristics of a well designed web page Section 4 Data and Information Management Module 4.1 Data as the computer sees it Number systems Data as the computer sees it Data storage Module 4.2 File management Introduction The file manager Files the basic unit of storage The need to organise Section 5 Social Implications Module 5.1 Social, ethical and legal issues surrounding ICTs Introduction EULAs, copyright and piracy Module 5.2 Green, health and global e-communication issues Ergonomics and health issues The need for green computing The impact of global e communication Module 5.3 Safe Internet and use Introduction Viruses Computer worms Trojans Spyware Adware Spam Hoaxes and scams Phishing Pharming spoofing Guidelines using the Internet and with courtesy and safety Appendix Connectors on a computer vii
8 Module This book is dedicated to the memory of our friend and colleague Annette Bezuidenhout who lost her brave fight against cancer in She inspired many to believe that IT is great! viii
Computers, part of your life Grade 12
Computers, part of your life Grade 12 A textbook for Computer Applications Technology Sandra Jacobs Reinet Barnard Rinus Brenkman Keith Gibson Ellen Labuschagne Pam Macmillan Pam Miller Chris Noomé Karin
More informationSUMMARIES OF INTERACTIVE MULTIMEDIA
SUMMARIES OF INTERACTIVE MULTIMEDIA GRADE 10-12 INTERNET TECHNOLOGIES 1. Introduction to Electronic Communications Use this lesson to: Understand the differences between the various e-communications modes
More informationGrade 10 IT work schedule break down 2018
Grade 10 IT work schedule break down 2018 Term 1 Systems Technologies: Basic concepts of computing What are Information and Communication Technologies (ICTs)? Define Information Technology Explain what
More informationDuplication and/or selling of the i-safe copyrighted materials, or any other form of unauthorized use of this material, is against the law.
Thank you for your interest in e-safety, and for teaching safe and responsible Internet use to your students. Educators are invited to access and download i-safe curriculum AT NO CHARGE under the following
More informationARIZONA CTE CAREER PREPARATION STANDARDS & MEASUREMENT CRITERIA SOFTWARE DEVELOPMENT,
SOFTWARE DEVELOPMENT, 15.1200.4 STANDARD 1.0 APPLY PROBLEM-SOLVING AND CRITICAL THINKING SKILLS TO INFORMATION 1.1 Describe methods of establishing priorities 1.2 Prepare a plan of work and schedule information
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationRPS Technology Standards Grades 9 through 12 Technology Standards and Expectations
RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations Throughout high school, as students take courses to prepare themselves for college and the working world, they should
More informationA Comprehensive Guide. IC3 - Module 1: Computing Fundamentals
Appendix A A Comprehensive Guide to IC 3 IC3 - Module 1: Computing Fundamentals Standardized Coding Number Objective 1.1 Objectives & Abbreviated Skill Sets Page Identify types of computers, how they process
More informationCommunication Technology/Technicians & Support Services CIP Task Grid
1 Secondary Task List 100 COMMUNICATION TECHNOLOGY AND SAFETY PROCEDURES 101 Explain Communication Technology and why it is important. 102 Demonstrate safety procedures in the field of communications technology
More informationAs the length of terms varies from one year to another, the teaching plan/work schedules should be adapted accordingly on a year-to-year basis.
3.7 Suggested teaching plan The suggested teaching plan indicates the minimum content to be covered per term. The sequence of the content or topics listed per term is not prescribed. Teachers should design
More informationECDL. European Computer Driving Licence. Computer Essentials. Syllabus Version 1.0
ECDL European Computer Driving Licence Using Microsoft Windows 7 Syllabus Version 1.0 This training, which has been approved by ICS Skills, includes exercise items intended to assist candidates in their
More informationCommunication Technology/Technicians & Support Services CIP Task Grid
Unit/Standard Number High School Graduation Years 2015, 2016, and 2017 Communication Technology/Technicians & Support Services CIP 10.9999 Task Grid Secondary Competency Task List 100 COMMUNICATION TECHNOLOGY
More informationLymm High School- KS3 Life after levels - Computing & ICT
Half Term 1 & 2 E- Safety BRONZE SILVER GOLD PLATINUM D and below= GCSE 1,2,3 C= GCSE 4 C/B= GCSE 5,6 A/A*= GCSE 7,8,9 Understand a range of ways Understand a range of Understand a range of Understand
More informationWeb Foundations Series Internet Business Associate
Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved
More informationPOS Perkins Statewide Articulation Agreement Documentation Coversheet
POS Perkins Statewide Articulation Agreement Documentation Coversheet Student Name: Secondary School Name: Secondary School Address: CTE Program of Study: CIP # CIP Program Name Grade 9 1. CAREER AND TECHNICAL
More informationINDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C
HausmanIndexFinal.qxd 9/2/05 9:24 AM Page 354 browser-hijacking adware programs, 29 brute-force spam, 271-272 business, impact of spam, 274-275 business issues, 49-51 C capacity, impact of security risks
More informationYear 8 Computing New Levels (Progress Pathways) Content and Concepts (depth of understanding and application) Computational Thinking
Year 8 Computing New Levels (Progress s) Progression Computer Systems, etc 7 9 Can explain clearly and in detail; - several laws that apply to computer use, including copyright and the Data Protection
More informationCSci530 Final Exam. Fall 2014
CSci530 Final Exam Fall 2014 Instructions: Show all work. No electronic devices are allowed. This exam is open book, open notes. You have 120 minutes to complete the exam. Please prepare your answers on
More informationHoly Family Catholic Primary School Computing Progression Map Year 1
Year 1 Graphics Use ICT to generate ideas for their work. Use tools including brushes, pens, line, fill and stamp to create images. Use save, open, edit and print. Manipulating Text Use spacebar, back
More informationF9A0 04 (ESKINT2): Using the Internet 2
F9A0 04 (ESKINT2): Using the Internet 2 4 SCQF credit points at SCQF level 5 Description: This is the ability to set up and use appropriate connection methods to access the internet; make the best use
More informationCompTIA A+ Complete Study Guide (Exams / ). Text with CD- ROM for Windows and Macintosh
CompTIA A+ Complete Study Guide (Exams 220-801/220-802). Text with CD- ROM for Windows and Macintosh Docter, Q ISBN-13: 9781118324059 Table of Contents Introduction xxxi Assessment Test liv Part I 220-801
More information2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines
2017 HSC Information and Digital Technology Web and Software Applications Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B 2 A 3 B 4 D 5 C 6 B 7 D 8 D 9 C 10 A 11 A 12 B 13 D
More informationDiscovering Computers Living in a Digital World
Discovering Computers 2010 Living in a Digital World Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet
More informationECDL / ICDL IT Security. Syllabus Version 2.0
ECDL / ICDL IT Security Syllabus Version 2.0 Module Goals Purpose This document details the syllabus for the IT Security module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationVocabulary Bank organized by module
Vocabulary Bank organized by module Module 1: Choosing a Computer Application: also called an "app," it is computer software created for a particular task or tasks; it is increasingly used to mean software
More informationLevel 1 Internet Safety for IT Users ( )
Level 1 Internet Safety for IT Users (7574-135) ITQ (QCF) Assignment guide for Candidates Assignment B www.cityandguilds.com November 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading
More informationUtah CTE/Business Education Core Computer Technology I
A Correlation of Pearson 2011 To the Utah CTE/Business Education Core Resource Title: Introduction to Computers & Publisher: Pearson Education, Inc. ISBN (13 digit unique identifier is required): 9781256362098
More informationSECURE USE OF IT Syllabus Version 2.0
ICDL MODULE SECURE USE OF IT Syllabus Version 2.0 Purpose This document details the syllabus for the Secure Use of IT module. The syllabus describes, through learning outcomes, the knowledge and skills
More informationInformation & Communications Technology (ICT) Essentials 1 (2017/2018)
Information & Communications Technology (ICT) Essentials 1 (2017/2018) Florida 9009110-2017 This document provides the correlation between interactive e-learning curriculum, and the Information & Communications
More informationUnit title: Client Side Scripting for Web Applications (SCQF level 7)
Higher National Unit specification General information Unit code: HF4X 34 Superclass: CE Publication date: July 2016 Source: Scottish Qualifications Authority Version: 01 Unit purpose This Unit is designed
More informationWeb insecurity Security strategies General security Listing of server-side risks Language specific security. Web Security.
Web Security Web Programming Uta Priss ZELL, Ostfalia University 2013 Web Programming Web Security Slide 1/25 Outline Web insecurity Security strategies General security Listing of server-side risks Language
More informationUMD: Using mobile IT devices
UMD: Using mobile IT s This is the ability to set up and use mobile or handheld s such as a smartphone, PDA, portable media player, electronic organiser or data logger, for data capture, processing, exchange
More informationCFASAA231 Use IT to support your role
Overview Handle files, edit, format and check information, search for and use email. This is based on the e-skills UK Areas of Competence export units: General Uses of IT and Use IT to exchange information.
More informationSoutham College Computing & ICT Department. Summer Project
Student Name: contact: sycamore.s@welearn365.com Southam College Computing & ICT Department Summer Project This booklet provides several tasks for you to update your current knowledge and learn new concepts
More informationChapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.
Name Date Chapter 10: Security After completion of this chapter, students should be able to: Explain why security is important and describe security threats. Explain social engineering, data wiping, hard
More informationPHP-security Software lifecycle General Security Webserver security PHP security. Security Summary. Server-Side Web Languages
Security Summary Server-Side Web Languages Uta Priss School of Computing Napier University, Edinburgh, UK Copyright Napier University Security Summary Slide 1/15 Outline PHP-security Software lifecycle
More informationTechnology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University
Technology Basics and Social Networking Presented by Gina Lobdell Graduate Student at Purdue University Photo Copyright 2012 AgVenture. All Rights Reserved. Welcome Goals of the workshop: Gain a better
More informationQualification Specification
FUNCTIONAL SKILLS ICT Level 1 & Level 2 Qualification Specification Qualification Recognition Numbers: Functional Skills Qualification in Information & Communication Technology at Level 1: 603/1567/2 Functional
More informationCreating Digital Animation in Adobe Animate: Frame-by-Frame Technique Motion & Shape Tweening Storyboarding Acquiring & importing Assets
September-October Half Term School Network Induction Using Computers Safely & Responsibly: Files & Folder Management Keeping Data Secure Social Networking Using Email Searching the Web Creating Digital
More informationEthics and Information Security. 10 주차 - 경영정보론 Spring 2014
Ethics and Information Security 10 주차 - 경영정보론 Spring 2014 Ethical issue in using ICT? Learning Outcomes E-policies in an organization relationships and differences between hackers and viruses relationship
More informationLevel 3 Cambridge Technical in IT 05838/05839/05840/05841/05842/05877 Unit 1: Fundamentals of IT
Level 3 Cambridge Technical in IT 05838/05839/05840/05841/05842/05877 Unit 1: Fundamentals of IT Monday 9 January 2017 Morning Time allowed: 1 hour 30 minutes You may use: a calculator INSTRUCTIONS Use
More informationGCSE ICT AQA Specification A (Full Course) Summary
GCSE ICT AQA Specification A (Full Course) Summary Areas not covered by the short course are shown in red. 9.1 The general Understand that information systems may be 1 structure of information systems
More informationDawood Public School Course Outline Computer Science Class XI
Dawood Public School Course Outline 2016-17 Computer Science Class XI Study Guide Text book: IGCSE Computer Science Course book by David Watson and Helen Williams Reference Book: Information Systems by
More informationProposed Syllabus for F.Y.B.Sc.( Computer Science) North Maharashtra University, Jalgaon. F.Y.B.Sc.( Computer Science) (w.e.f.
Proposed Syllabus for F.Y.B.Sc.( Computer Science) North Maharashtra University, Jalgaon F.Y.B.Sc.( Computer Science) (w.e.f. June-2015) Scheme Details Examination Pattern : 40 Internal : 60 External Periods
More informationDeveloping Web Applications
Developing Web Applications Ralph Moseley Middlesex University IIICENTCNNIAL 1807 ewiley 2007 13ICCNTENNIAL John Wiley & Sons, Ltd Preface Introduction Features Additional Materials Trademarks Acknowledgments
More informationDawood Public School Course Outline Computer Science
1 Dawood Public School Course Outline 2018-19 Computer Science Class XI Study Guide Text book: IGCSE Computer Science Course book by David Watson and Helen Williams Reference Book: Information Systems
More informationContents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45
User Guide i Contents Introduction 5 McAfee SecurityCenter 7 Features... 8 Using SecurityCenter... 9 Header... 9 Left column... 9 Main pane... 10 Understanding SecurityCenter icons... 11 Understanding
More informationDawood Public School Course Outline Computer Science Class XI
Dawood Public School Course Outline 2015-16 Computer Science Class XI Study Guide Text book: Computer Course book by Chris Lead better Reference Book: Cambridge IG CSE Computer Science by David Watson
More informationACCREDITED HEALTH & SAFETY SHORT COURSES
ACCREDITED HEALTH & SAFETY 2018 ACCREDITED HEALTH & SAFETY INTRODUCTION Our services benefit any organization dedicated to the development and enhancement of skills and knowledge through training. Frontline
More informationLegal notice and Privacy policy
Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains
More informationChapter 12: Social Implications of IT
!" #$$ %! & The final exam will be cumulative! Please also study previous midterm reviews and exams and other material from the beginning of the course. For instance: Six Steps in the Debugging Process
More informationSystems and Principles Unit Syllabus
Systems and Principles Unit Syllabus Level 2 Install and configure ICT equipment and operating systems 7540-229 www.cityandguilds.com June 2010 Version 2.0 About City & Guilds City & Guilds is the UK s
More informationSan Joaquin County Office of Education Regional Occupational Centers/Programs Desktop Publishing ~ Course Outline CBEDS#: 5757 ~ Course ID#: 57570
Desktop Publishing Course Outline 1 Module I: General Workplace skills 5 Personal Traits Self Confidence Honesty Perseverance Self Discipline Responsibility Positive Attitude Work Ethic Personal Hygiene
More informationDUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION
DUMBARTON ACADEMY NATIONAL 5 COMPUTING SCIENCE REVISION NAME Data Representation Keypoints - binary numbers, floating point notation, mantissa, exponent, ASCII, unicode, character set, bit-mapped graphics,
More informationReview Ch. 3 Connecting to the World s Information. 2010, 2006 South-Western, Cengage Learning
Review Ch. 3 Connecting to the World s Information 2010, 2006 South-Western, Cengage Learning Networks Two linked computers is a network A network of computers located within a short distance is called
More informatione-quals Unit Syllabus
e-quals Unit Syllabus Level 2 Using the internet for finding, selecting and sending information 7266-025 www.cityandguilds.com/e-quals07 March 2007 Version 1.0 About City & Guilds City & Guilds is the
More informationBelfairs Academy Computer Science Fundamentals
Computer Science Fundamentals Year 7 T1 E safety and Cybercrime I understand how and why to stay safe online. I understand the meaning of cybercrime. Digital Publishing (Word Processing, DTP, Digital Presentations)
More informationAndroid App Development for Beginners
Description Android App Development for Beginners DEVELOP ANDROID APPLICATIONS Learning basics skills and all you need to know to make successful Android Apps. This course is designed for students who
More informationTechnology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 8 Behind the Scenes: Software Programming 2 Topics Understanding Software Programming The Importance
More informationHTML5 MOBILE WEBSITES
HTML5 MOBILE WEBSITES HTML5 MOBILE WEBSITES TURBOCHARGING HTML5 WITH jquery MOBILE, SENCHA TOUCH, AND OTHER FRAMEWORKS MATTHEW DAVID AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO
More informationTopic Course Activities
The Absolute Basics What is a computer? 1. What is a computer? 2. What is a screen? 3. What is a keyboard? 4. What is a mouse? What is a laptop? 1. What is a laptop? 2. Using the touchpad 3. How to charge
More informationKS3 Programme of Study Subject: Computing Year group: Y7
KS3 Programme of Study Subject: Computing Year group: Y7 Cybercrime 14/11/16 2/12/16 due AF1 Introduction - savings, set up folders, Health and Safety, Classroom Rules How to log on and secure passwords
More informationKULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop
KULLEĠĠ SAN BENEDITTU Boys Secondary, Kirkop Mark HALF-YEARLY EXAMINATION 2013/14 Levels 5-6-7-8 FORM 3 ICT TIME: 1h 30min Section A Question 1 2 3 4 5 6 7 8 Max. Mark 6 4 8 3 18 2 6 2 Mark Section B Question
More informationCOURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4
This course will run the two units, 3 and 4, concurrently. The student Semester 1 grade will therefore be an estimate. Term Knowledge Skills Assessment 1 1 Introduction introduction to the course assessment
More informationBoca Raton Community High School AP Computer Science A - Syllabus 2009/10
Boca Raton Community High School AP Computer Science A - Syllabus 2009/10 Instructor: Ronald C. Persin Course Resources Java Software Solutions for AP Computer Science, A. J. Lewis, W. Loftus, and C. Cocking,
More informationComputer Literacy - A Beginners' Guide
Computer Literacy - A Beginners' Guide Other Macmillan Books of Related Interest Advanced Graphics with the Acorn Electron Ian O. Angell and Brian J. Jones Advanced Graphics with the BBC Model B Microcomputer
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationTHINGS TO REMEMBER INTRODUCTION TO COMPUTERS
PREMIER CURRICULUM SERIES Based on the Sunshine State Standards for Secondary Education, established by the State of Florida, Department of Education THINGS TO REMEMBER INTRODUCTION TO COMPUTERS Copyright
More informationSecurity and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1
Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents
More informationPractical Hands-on Data Communications, Networking and TCP/IP Troubleshooting for Engineers and Technicians
Presents Practical Hands-on Data Communications, Networking and TCP/IP Troubleshooting for Engineers and Technicians Revision 1 Website: www.idc-online.com E-mail: idc@idc-online.com IDC Technologies Pty
More informationCopyright 2006 Prentice-Hall. All rights reserved. 1
PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)
More informationLevel 2 ITQ Award/Certificate/Diploma for IT Users
Level 2 ITQ Award/Certificate/Diploma for IT Users Level 2 (7574-02, -90) www.city-and-guilds.co.uk November 2011 Version 1.2 Unit recording forms with centre and candidate details forms QCA reference
More informatione-quals Unit Syllabus
e-quals Unit Syllabus Level 1 Fundamentals of computing systems and customer care 7266 111 www.cityandguilds.com/e-quals07 March 2007 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider
More informationCOUNTERING COUNTERING SPAM IN A DIGITAL WORLD
IN A DIGITAL WORLD EU SYMPOSIUM 2006 15 June 2006 Maastricht, The Netherlands Cristina Bueti Cristina Bueti Project Officer Strategy and Policy Unit (SPU) International Telecommunication Union www.itu.int/spam
More informationThird Grade Technology Curriculum Guide
Completed Third Grade Technology Curriculum Guide - 2016 1 - NOVICE LEARNER - Students will demonstrate basic operational competencies, concepts, and program usage. BASIC OPERATIONS 1-1 Uses the mouse
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationProgram and Electronic Projects for the SSC, Electron and Spectrum Computers
Program and Electronic Projects for the SSC, Electron and Spectrum Computers Macmillan Electronic Projects Series Audio Circuits and Projects (revised edition) Graham Bishop Program and Electronic Projects
More informationSECTION C GRADE 12 EXAMINATION GUIDELINES
SACAI SECTION C GRADE 12 EXAMINATION GUIDELINES COMPUTER APPLICATIONS TECHNOLOGY 2016 Examination guidelines for Computer Application Technology INTRODUCTION The Curriculum and Assessment Policy Statement
More informationNational Unit Specification: general information. The Internet (Higher) NUMBER DM4F 12. Information Systems (Higher)
National Unit Specification: general information NUMBER DM4F 12 COURSE Information Systems (Higher) SUMMARY This Unit is designed to develop knowledge and understanding of the operating principles of the
More informationTennessee. Business Technology Course Code Web Design Essentials. HTML Essentials, Second Edition 2010
Tennessee Business Technology Course Code 6501240 Web Design Essentials HTML Essentials, Second Edition 2010 Notation Key SE Student Edition LE Learning Expectation Standard 1.0 Demonstrate knowledge of
More informationChapter 10: Security and Ethical Challenges of E-Business
Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.
More informationMcAfee Internet Security Suite Quick-Start Guide
Enjoy a Worry Free Online Experience McAfee Internet Security Suite protects your PC, identity and online experience. It also includes PC and network tools, plus McAfee SiteAdvisor for safe surfing. Internet
More informationNHS South Commissioning Support Unit
NHS South Commissioning Support Unit ICT Anti-virus Policy This document can be made available in a range of languages and formats on request to the policy author. Version: Ratified by: V.2.1 Alliance
More informationKey Learning in Computing: Years 5 and 6 Information Technology
Information Technology Programme of Study Select, use and combine a variety of software (including internet services) on a range of digital devices to design and creat e a range of programs, systems and
More informationAN INTRODUCTION TO SCRATCH (2) PROGRAMMING
AN INTRODUCTION TO SCRATCH (2) PROGRAMMING Document Version 2 (04/10/2014) INTRODUCTION SCRATCH is a visual programming environment and language. It was launched by the MIT Media Lab in 2007 in an effort
More informationLevel 3 Using the Internet (INT )
Level 3 Using the Internet (INT 7574-307) ITQ (QCF) Assignment guide for Candidates Assignment A www.cityandguilds.com September 2010 Version 1.0 About City & Guilds City & Guilds is the UK s leading provider
More informationCOURSE INFORMATION PACK
COURSE INFORMATION PACK Contact Details (Head Office) Bellville Campus Bellville Business Park DJ Wood Street Bellville 7530 Tel: 021 949 5036/7 Fax: 021 948 1859 Email: info@prestigeacademy.co.za Website:
More informationELECTRONIC BANKING & ONLINE AUTHENTICATION
ELECTRONIC BANKING & ONLINE AUTHENTICATION How Internet fraudsters are trying to trick you What you can do to stop them How multi-factor authentication and other new techniques can help HELPING YOU STAY
More informationLevel 2 Digital Home Technology Integrator ( )
Level 2 Digital Home Technology Integrator (7575-002) Assignment guide for Candidates Assignment B www.cityandguilds.com December 2011 Version 1.0 About City & Guilds City & Guilds is the UK s leading
More informationUnit 2 Assignment 2. Software Utilities?
1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.
More informationHere s my plan for what I will cover.
1 Here s my plan for what I will cover. The most important area of this talk will cover the a cycle of usability that involves 4 components. (you can start from any one of these 4 areas depending on what
More informationKS3 Computing - Life Without Levels
Project Elite Standard Foundation To create a strong password and log To create a strong password and log on. Create a password and log on with on independently. Give a basic explanation as to what makes
More informationA1 ASSIGNMENT TERMINOLOGY.
A1 ASSIGNMENT TERMINOLOGY. Emma Ziolkowski Term Definition Image blog a web page or site that speaks to an audience of readers informally about opinionated topics. a blog is a website on which the author
More informationTotal Mark out of 35
University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:
More informationCFASAA231 Use IT to support your role
Overview Handle files, edit, format and check information, search for and use email. This is based on the e-skills UK Areas of Competence export units: General Uses of IT and Use IT to exchange information.
More informationQualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law
Qualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law Aims and objectives of this qualification This qualification aims to develop learners
More informationTechnology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright 2015 Pearson Education,
More informationQCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60. Aim and purpose. Unit introduction
Unit 42: Computer Networks Unit code: R/601/7320 QCF Level 3: BTEC Specialist Credit value: 10 Guided learning hours: 60 Aim and purpose The aim of this unit is to ensure learners understand the key components
More informationName: Std: 6. Q.1 Fill in the blanks (Select the correct option) (6 Marks)
Name: Std: 6 Div: Q.1 Fill in the blanks (Select the correct option) (6 Marks) (Search engine, Venn diagram, Google Chrome, Devices, Identify the goal, Internet) 1) The is a combined collection of interconnected
More informationUnit 2: Technology Systems
Unit 2: Technology Systems Level: 1 and 2 Unit type: Core Guided learning hours: 30 Assessment type: External Unit introduction Technology systems are involved in many of the objects we use every day,
More information