Preview from Notesale.co.uk Page 12 of 49

Similar documents
Qualification Specification

Higher National Unit specification: general information. Computing: PC Hardware and Operating Systems Essentials

Published by the Caribbean Examinations Council.

Data protection policy

C A R I B B E A N E X A M I N A T I O N S C O U N C I L REPORT ON CANDIDATES WORK IN THE SECONDARY EDUCATION CERTIFICATE EXAMINATIONS MAY/JUNE 2010

Program SLOs Computer Information Science

European Risk Management Certification. Candidate Information Guide

Unit title: Computing: Website Design and Development (SCQF level 5)

Syllabus for CIT 442 Information System Security 3 Credit Hours Spring 2015

Enviro Technology Services Ltd Data Protection Policy

Work-ready skills in Business, Administration and IT

Work-ready skills in Business, Administration and IT

Information Security Data Classification Procedure

Institute of Technology, Sligo. Information Security Policy. Version 0.2

ERMS Folder Development and Access Process

RTO Policy 9: Issuing Qualifications

Qualification details

SUMMARY This core skills Unit develops skills in using a computer system to process a range of information.

CARIBBEAN EXAMINATIONS COUNCIL Guidelines for the Submission of Electronic SBA Samples

Computer Science General Course Year 12. Selected Unit 3 syllabus content for the. Externally set task 2019

CSET 3400 Unix System Administration (3 semester credit hours) IT Elective

Acceptable Use Policy

Qualification details

INFORMATION ASSET MANAGEMENT POLICY

Qualification Specification NCFE Level 2 Diploma in Business Administration (601/3964/X) Business, Administration and Law

BCS IT User Syllabus ECDL Unit 2 Using the Computer and Managing Files/IT User Fundamentals Level 1. Version 5.0

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

NSF Data Management Plan Template Duke University Libraries Data and GIS Services

Data Protection Policy

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

IQ Level 4 Award in Understanding the External Quality Assurance of Assessment Processes and Practice (QCF) Specification

Principles of Managing Information and Producing Documents

PROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.

The author has asserted their right to be identified as the author of this work in accordance with the Copyright, Design and Patents Act 1988.

Data Protection Policy

Checklist: Credit Union Information Security and Privacy Policies

Each member of the St. Margaret s Community has the privilege to access Google Apps provided by the school s network

Policy & Procedure Privacy Policy

UNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering

Burnaby Online Program School District #41 Burnaby

Higher National Unit specification: general information. Graded Unit 2

Selected Unit 3 syllabus content for the. Externally set task 2018

Levels 1-3 Qualifications in Engineering (2850)

UKIP needs to gather and use certain information about individuals.

Typical Training Duration 11 months

SAMPLE COURSE OUTLINE APPLIED INFORMATION TECHNOLOGY ATAR YEAR 12

CHARTERED MEMBER ASSESSMENT. Candidate Handbook LEADING GOVERNANCE

EXAM PREPARATION GUIDE

Portfolio Report (for all weekly practicals)

Healing School - A Science Academy GDPR Policy (Exams) 2018/19

PANORAMA Data Security & Access Protocol

Data Protection Policy

ProQual Internal Quality Assurance Qualifications

WIT Diverse Campus Services Ltd. Data Protection Policy

Statement on Continuing Professional Education 2003*

NHS R&D Forum Privacy Policy: FINAL v0.1 May 25 th 2018

ProQual External Quality Assurance Qualifications. Level 4 Award in the External Quality Assurance of Assessment Processes and Practice

2.4. Target Audience This document is intended to be read by technical staff involved in the procurement of externally hosted solutions for Diageo.

Higher National Unit specification: general information. Computing: PC Hardware and Operating Systems Support

ICSE REGISTRATION MODULE V 2.0. User Guide for Schools

SAMPLE. ICT Entry Level 3. Functional Skills. Assessor Pack. Assessment Code: FSIE3SA/P

SAULT COLLEGE OF APPLIED ARTS & TECHNOLOGY SAULT STE MARIE, ON COURSE OUTLINE

Request for Proposal Technology Services, Maintenance and Support

Information technology Security techniques Information security controls for the energy utility industry

Element Finance Solutions Ltd Data Protection Policy

Records Information Management

Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Fall 2012

CPEA ONLINE REGISTRATION Administrator s User Guide. December 2011 Version: 1.1

Information Classification and Handling Policy

PRIVACY POLICY Let us summarize this for you...

Chartered Member Assessment

REPORT ON CANDIDATES WORK IN THE SECONDARY EDUCATION CERTIFICATE EXAMINATION JANUARY 2010 INFORMATION TECHNOLOGY TECHNICAL PROFICIENCY EXAMINATION

General Data Protection Regulation policy (exams) 2017/18

Course Collect user manual 11/08/2014 V1.0

Electronic Network Acceptable Use Policy

Data protection. 3 April 2018

UNCLASSIFIED. Mimecast UK Archiving Service Description

Technology Competence Initiative

1.1 Research and describe the current and historical uses and applications of character modelling. 1.2 Describe the uses of

Word processing software

Syllabus for HPE 076 Varsity Volleyball (Women) Sports 1 Credit Hour Fall 2014

General Data Protection Regulation policy 2017/18

Syllabus for HPE 099 Aerobic Proficiency 1 Credit Hour Spring 2015

Subject: University Information Technology Resource Security Policy: OUTDATED

Syllabus for HPE 120 Dance Aerobic Proficiency 0.0 Credit Hour Spring 2012

Cambridge Assessment International Education Cambridge International Advanced Subsidiary and Advanced Level. Published

Programme Specification

SYLLABUS. Departmental Syllabus CIST0147. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus

APPENDIX TWO RETENTION AND DISPOSAL SCHEDULE IMPLEMENTATION GUIDELINES

Syllabus for CSC 455 Database Systems 3 Credit Hours Spring 2012

Spreadsheet Software L2 Unit Book

EXAM PREPARATION GUIDE

Summer Assignment for BTEC Level 3 Nationals in Information Technology

LCCI Information Manual For the academic year 2017/18

ICORS Terms of Service

Cxc Principles Of Business Study Guide

Instructions for the Conduct of the Examination and Coursework (ICE) Physical Education. Entry Level Certificate (ELC) 8930

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

1.1 Research and describe the current and historical concepts and principles of graphics design to include: a) composition and layout

Transcription:

SECTION I: FUNDAMENTALS OF COMPUTING [cont d] 8. describe ways of caring for computers and peripherals in the working environment; 9. discuss health and safety factors associated with computer use. General care and physical protection of the computer. Health Ergonomics Effects of extended use. Inadequate lighting. Inappropriate furniture. Bad posture. Safety Overloading electric sockets Position of work stations Location of extension cords Page 12 of 49 CXC 34/G/SYLL 12 8

SECTION III: INTRODUCTION TO APPLICATION SOFTWARE 1. identify various types of application software; Word processing, Spreadsheet, Database Management and Presentation. 2. explain the purpose of a word processor; Instances in which word processing should be used. Manipulation of text data. Illustration of the features of a word processing application. 3. explain the purpose of a spreadsheet; Instances in which spreadsheets should be used. Manipulation of numeric data; Illustrate the features of a spreadsheet application. 4. explain the purpose of a database management system; 5. explain the uses of a presentation software; 6. determine the appropriate software to be used to perform specific tasks. Instances in which databases should be used. Electronic storage and manipulation of data in tables for easy retrieval. Illustration of the features of a database application. Instances in which presentation software should be used. Presentations including delivery of lectures, speeches and reports. Illustration of the features of a presentation application. Selection of appropriate word-processing, spreadsheet, database management, presentation and other specialised software. Page 14 of 49 CXC 34/G/SYLL 12 10

SECTION VIII: DOCUMENT MANAGEMENT 1. distinguish between a manual and electronic filing system; 2. identify types of documents used in data processing; Definitions and comparisons. Advantages and disadvantages. Source documents, turnaround documents and machine readable documents. 3. manipulate an electronic filing system; Organisation of drives, folders and files in a hierarchical structure. 4. explain issues related to the integrity of files; Overwrite protection, restricted access, virus protection and encryption, read only access. 5. discuss issues related to the security of files; 6. examine issues related to the retention of files; 7. explain methods for tracing document versions. Use of passwords, firewall, disaster recovery mechanisms, for example, fireproof and waterproof storage, backup systems. Archiving, retention period and disposal; legal limit for retaining files. Traceability of document versions. Versioning: Successive versions of documents that change over time; Metadata: data stored on document, including date created, date modified, date accessed, owner, access privileges. Page 20 of 49 CXC 34/G/SYLL 12 16

SECTION IX: ETHICS 1. explain the concept of intellectual property; 2. describe the rights that are protected by intellectual property laws; Intellectual property conceptualised as the protection of the rights of persons who produce, gather or disseminate ideas and information, including authors, singers and journalists. Rights that are protected Economic rights: the level of payment for use of the product by third parties. 3. discuss ethical standards with respect to intellectual property; Moral rights: violating the integrity and reputation of the author through misrepresentation or misquoting of the work. The copyright concept Publishers or distributors as those who enter into agreements with producers to record, film or print the material and distribute it in ways that would secure the financial interests of producers and prevent the unethical use of the material. Consumers or users as those who have access to all types of information but must acknowledge the source or seek permission of the producer through the publisher, who may charge a fee under certain circumstances. Page 21 of 49 Producers or owners as those who maintain ownership and control over their material and receive financial reward from the user, through the publisher. 4. explain the concept of plagiarism; Plagiarism conceptualised as the use of someone s intellectual property without giving appropriate credit. CXC 34/G/SYLL 12 17

SECTION IX: ETHICS (cont d) 5. list guidelines to avoid plagiarism; Guidelines to avoid plagiarism Acknowledgement of references in text and bibliography, for example, use of referencing formats. Obtaining approval for other persons work. 6. plan and order priorities to ensure acceptable standards of work; Organisation of work and work station; submission of assignments; execution of effective time management; follow-up procedures. 7. demonstrate awareness of desirable habits and work attitudes. Elements of desirable habits and work attitudes (a) Individual responsibility or working without supervision. (b) Willingness. (c) Meeting deadlines. (d) Team spirit. (e) Co-operation. (f) Recognition of diversity. (g) Courtesy. (h) Punctuality and regularity. (i) Good grooming. (j) Personal integrity. (k) Respect for others. Page 22 of 49 CXC 34/G/SYLL 12 18

SBA ASSIGNMENTS SUGGESTED MARK ALLOCATION BY ASSIGNMENT AND PROFILE DIMENSION TERM ASSIGNMENT ACCURACY AND SPEED PROFILE MARKS KNOWLEDGE AND COMPREHENSION PRESENTATION AND USE OF TECHNOLOGY TOTAL Term III Assignment 1 10 5 10 25 Term IV Assignment 2 10 5 10 25 Term V Assignment 3 10 5 10 25 30 15 30 75 Using the guidelines which follow, these assignments will be prepared, administered and marked by the subject teacher(s) in the respective schools. Teachers will have the responsibility for the preparation of keys and mark schemes for the assignments which must be designed around the mark scheme provided in the syllabus. Said samples of these assignments, keys and mark schemes MUST be submitted for moderation by the Caribbean Examinations Council. Each assignment may differ in the time allocated and the skills required. The mark allocation may vary according to the level of difficulty of each assignment. ASSIGNMENT 1 In Assignment 1, students are expected to correct text from the author s original work which contains amendments and respond to printers correction signs. Students are expected to present documents in a style consistent with universally accepted standards. Mark scheme guidelines have also been given from which the teacher may select the most suitable criteria for the assignment administered. Additional criteria may be added where appropriate and marks awarded as suitable for the assignment. These marks must, however, add up to or be scaled to the totals given. To produce marks that are reliable, the marking must be consistent for all students. The teacher must be able to justify EACH mark awarded. This assignment covers, but is not limited to the following sections of the syllabus: (I), (II), (III) and (IV). EXEMPLAR 1 Page 24 of 49 The exemplar consists of the assignment, key and mark scheme. Combined, the exemplar demonstrates how: 1. The 25 marks allocated for the assignment are further allocated to profile dimensions; 2. Each criterion being assessed has a prescribed set of marks ranging between the maximum allocated and zero, and what evidence must be present to justify the award of marks; 3. The selected task corresponds to specified syllabus objectives. It is recommended that you review the assignment, key and mark scheme alongside each other to CXC 34/G/SYLL 12 20

confirm that: all the required tasks have been completed all tasks specified have marks allocated to them the mark scheme is detailed enough to allow you to reliably mark any response that may be presented for the question. Page 25 of 49 CXC 34/G/SYLL 12 21

GLOSSARY Aligning Automation Backing storage A data item residing in a cell will usually be aligned in one of three positions within the cell, namely left-align, right-align or centred. Computer control of machines and processes. Memory external to the computer used for storage of large quantities of data or large programs. Backing store is also known as secondary store, auxiliary store or external store. Bit An acronym for binary digit. It can have a value of 1 or 0. Border In printing a spreadsheet certain groups of column or rows may be designated as left or top borders to ensure that the information they contain will appear on all pages of the print-out. Bulletin board Byte Character Computer CPU An electric equivalent of a conventional bulletin board. It is used as part of a communication network where users can post messages, read messages posted by other users, communicate with the system operator and upload or download programs. A group of eight bits, usually representing a single character. One of the set of symbols that may be represented in a computer. Characters may be letters, digits and symbols. Electronic machine or device that accepts and processes data to produce information. Page 43 of 49 Central Processing Unit. Database Database Management System A collection of data files that may be used by a number of applications with storage and access to the data controlled by a set of programs known as Database Management System. (DBMS) Programs and database files that allow timely and easy controlled access to data by a number of users. Down-load Process whereby programs or data are transferred via communications channels, from a computer and stored on media located at the user s computer. Dry-run Electronic mail A manual traversal of the logic of a program. Mail or messages transmitted electronically by computers via communication channels. It is usual for such messages to be held in a central store for retrieval at the user s convenience. CXC 34/G/SYLL 12 39