SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Scottish Qualifications Authority 36
HN Assessment Exemplar/H178 34/AEX001 V1.0
Team Working in Computing May 2012
ICT journal
Name:
ICT operations
This section relates to the selection and appropriate use of ICT.
You must identify suitable software for the tasks and also make appropriate use of
ICT to present information in an appropriate format.
You are also required to identify one hardware and one software problem, and state
how you resolved these.
Select and use software for a range of tasks
List of software used Purpose of software used
Identify common hardware and software problems and can resolve simple
problems
Hardware problem State how you resolved the problem
Software problem State how you resolved the problem
Scottish Qualifications Authority 37
HN Assessment Exemplar/H178 34/AEX001 V1.0
Team Working in Computing May 2012
Name:
Accessing information using ICT
You are required to carry out searching for and locating information in different
formats. You will apply complex search strategies and carry out evaluation of
information found and the effectiveness of the search strategy.
Define search topic and complex search strategy
What topic are you searching for
information on?
You are required to search in at least
three locations. Provide details of the
sources, eg Internet, CD-ROM,
intranet, own computer.
Source 1
Source 2
Source 3
Provide an outline of the search
strategy that you will use to search for
information. Include choice of sources,
keywords, order and logic.
How will you evaluate the information?
Identify the criteria used, eg how up-to-
date is the information, is the
information at a level you understand,
is it reliable, biased, relevant and in an
appropriate format?
How well did your search strategy meet
the criteria? Did it produce information
that matched the chosen criteria, was it
effective in terms of time and cost, did
it successfully filter out irrelevant
information?
Keeping information safe
How will you ensure that your data is secure and well managed?(eg keeping own
login and password secure, virus protection, backing up data, maintaining
personal file area)
Provide details of how you ensured that
your data was secure.
Provide details of how you
maintained/organised your own
personal file area.

Mais conteúdo relacionado

Mais procurados

Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)
silambu111
 

Mais procurados (20)

Data mining introduction
Data mining introductionData mining introduction
Data mining introduction
 
[AIIM17] Data Categorization You Can Live With - Monica Crocker
[AIIM17]  Data Categorization You Can Live With - Monica Crocker [AIIM17]  Data Categorization You Can Live With - Monica Crocker
[AIIM17] Data Categorization You Can Live With - Monica Crocker
 
Data mining techniques
Data mining techniquesData mining techniques
Data mining techniques
 
FAIR principles and metrics for evaluation
FAIR principles and metrics for evaluationFAIR principles and metrics for evaluation
FAIR principles and metrics for evaluation
 
Pre processing big data
Pre processing big dataPre processing big data
Pre processing big data
 
Popular Text Analytics Algorithms
Popular Text Analytics AlgorithmsPopular Text Analytics Algorithms
Popular Text Analytics Algorithms
 
Pingar - The Future of Text Analytics
Pingar - The Future of Text AnalyticsPingar - The Future of Text Analytics
Pingar - The Future of Text Analytics
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Capstone Presentation Group 6
Capstone Presentation Group 6Capstone Presentation Group 6
Capstone Presentation Group 6
 
Making Data FAIR (Findable, Accessible, Interoperable, Reusable)
Making Data FAIR (Findable, Accessible, Interoperable, Reusable)Making Data FAIR (Findable, Accessible, Interoperable, Reusable)
Making Data FAIR (Findable, Accessible, Interoperable, Reusable)
 
Ben Analytics Introduction to Predictive Analytics
Ben Analytics Introduction to Predictive AnalyticsBen Analytics Introduction to Predictive Analytics
Ben Analytics Introduction to Predictive Analytics
 
Functions of information retrival system(1)
Functions of information retrival system(1)Functions of information retrival system(1)
Functions of information retrival system(1)
 
Efficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity rankingEfficient instant fuzzy search with proximity ranking
Efficient instant fuzzy search with proximity ranking
 
Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning Introduction to data pre-processing and cleaning
Introduction to data pre-processing and cleaning
 
Mapping a Privacy Framework to a Reference Model of Learning Analytics
Mapping a Privacy Framework to  a Reference Model of Learning AnalyticsMapping a Privacy Framework to  a Reference Model of Learning Analytics
Mapping a Privacy Framework to a Reference Model of Learning Analytics
 
Data mining
Data miningData mining
Data mining
 
Data Skills for Digital Era
Data Skills for Digital EraData Skills for Digital Era
Data Skills for Digital Era
 
SciBite
SciBiteSciBite
SciBite
 
introduction to data science
introduction to data scienceintroduction to data science
introduction to data science
 
Data Mining with big data total ieee project and entire files.
Data Mining with big data total ieee project and entire files.Data Mining with big data total ieee project and entire files.
Data Mining with big data total ieee project and entire files.
 

Semelhante a Ict journal layout

Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
bagotjesusa
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docx
manningchassidy
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Glenn Villanueva
 
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docxAssignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
rock73
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
humphrieskalyn
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
Seamus Tuohy
 
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptxUnit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
tesfkeb
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Data management plans
Data management plansData management plans
Data management plans
Brad Houston
 
Bowling Green State University Digital Forensics Challenges Project.docx
Bowling Green State University Digital Forensics Challenges Project.docxBowling Green State University Digital Forensics Challenges Project.docx
Bowling Green State University Digital Forensics Challenges Project.docx
sdfghj21
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
ronak56
 

Semelhante a Ict journal layout (20)

Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docxTerm Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security Officer.docx
 
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
Research Ethics and Integrity | Ethical Standards | Data Mining | Mixed Metho...
 
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docxAssignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
Assignment 4 Data-Hiding TechniquesDue Week 8 and worth 100 p.docx
 
Secondary Research in Applied Marketing Research
Secondary Research in Applied Marketing ResearchSecondary Research in Applied Marketing Research
Secondary Research in Applied Marketing Research
 
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma  Identity TheftStakeholdersConfidentiality.docxEthical dilemma  Identity TheftStakeholdersConfidentiality.docx
Ethical dilemma Identity TheftStakeholdersConfidentiality.docx
 
Data Mining based on Hashing Technique
Data Mining based on Hashing TechniqueData Mining based on Hashing Technique
Data Mining based on Hashing Technique
 
DATA CAPTURING TRAINING_FINAL.pptx
DATA CAPTURING TRAINING_FINAL.pptxDATA CAPTURING TRAINING_FINAL.pptx
DATA CAPTURING TRAINING_FINAL.pptx
 
Technical Documentation 101 for Data Engineers.pdf
Technical Documentation 101 for Data Engineers.pdfTechnical Documentation 101 for Data Engineers.pdf
Technical Documentation 101 for Data Engineers.pdf
 
Internet Intelligence Approach
Internet Intelligence ApproachInternet Intelligence Approach
Internet Intelligence Approach
 
Practical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence CollectionPractical and Actionable Threat Intelligence Collection
Practical and Actionable Threat Intelligence Collection
 
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptxUnit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Data management plans
Data management plansData management plans
Data management plans
 
1. Discussion (Chapter 3) Why are the originalraw data not readily.docx
1. Discussion (Chapter 3) Why are the originalraw data not readily.docx1. Discussion (Chapter 3) Why are the originalraw data not readily.docx
1. Discussion (Chapter 3) Why are the originalraw data not readily.docx
 
Data Science Unit1 AMET.pdf
Data Science Unit1 AMET.pdfData Science Unit1 AMET.pdf
Data Science Unit1 AMET.pdf
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
Bowling Green State University Digital Forensics Challenges Project.docx
Bowling Green State University Digital Forensics Challenges Project.docxBowling Green State University Digital Forensics Challenges Project.docx
Bowling Green State University Digital Forensics Challenges Project.docx
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 

Mais de FifeCollege

Mais de FifeCollege (13)

Fife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good PresentationFife College, Namjar, Apps for Good Presentation
Fife College, Namjar, Apps for Good Presentation
 
Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014Zeus Presentation Pitch 2014
Zeus Presentation Pitch 2014
 
Us beegees competiton presentation
Us beegees competiton presentationUs beegees competiton presentation
Us beegees competiton presentation
 
5 alive competition presentation
5 alive competition presentation5 alive competition presentation
5 alive competition presentation
 
The Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation PitchThe Sprites 2014 Presetation Pitch
The Sprites 2014 Presetation Pitch
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentation
 
Sonic shockwave presentation
Sonic shockwave presentationSonic shockwave presentation
Sonic shockwave presentation
 
Fife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good PresentationFife College, French Toast Mafia, Apps for Good Presentation
Fife College, French Toast Mafia, Apps for Good Presentation
 
Citrus apps competition presentation
Citrus apps competition presentationCitrus apps competition presentation
Citrus apps competition presentation
 
Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation Fife College - The Cats Meow - Apps for Good presentation
Fife College - The Cats Meow - Apps for Good presentation
 
A team competition presentation
A team competition presentationA team competition presentation
A team competition presentation
 
Apps For U Presentation Pitch
Apps For U Presentation PitchApps For U Presentation Pitch
Apps For U Presentation Pitch
 
The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation The Dark Fire Stars Pitch Presentation
The Dark Fire Stars Pitch Presentation
 

Ict journal layout

  • 1. Scottish Qualifications Authority 36 HN Assessment Exemplar/H178 34/AEX001 V1.0 Team Working in Computing May 2012 ICT journal Name: ICT operations This section relates to the selection and appropriate use of ICT. You must identify suitable software for the tasks and also make appropriate use of ICT to present information in an appropriate format. You are also required to identify one hardware and one software problem, and state how you resolved these. Select and use software for a range of tasks List of software used Purpose of software used Identify common hardware and software problems and can resolve simple problems Hardware problem State how you resolved the problem Software problem State how you resolved the problem
  • 2. Scottish Qualifications Authority 37 HN Assessment Exemplar/H178 34/AEX001 V1.0 Team Working in Computing May 2012 Name: Accessing information using ICT You are required to carry out searching for and locating information in different formats. You will apply complex search strategies and carry out evaluation of information found and the effectiveness of the search strategy. Define search topic and complex search strategy What topic are you searching for information on? You are required to search in at least three locations. Provide details of the sources, eg Internet, CD-ROM, intranet, own computer. Source 1 Source 2 Source 3 Provide an outline of the search strategy that you will use to search for information. Include choice of sources, keywords, order and logic. How will you evaluate the information? Identify the criteria used, eg how up-to- date is the information, is the information at a level you understand, is it reliable, biased, relevant and in an appropriate format? How well did your search strategy meet the criteria? Did it produce information that matched the chosen criteria, was it effective in terms of time and cost, did it successfully filter out irrelevant information? Keeping information safe How will you ensure that your data is secure and well managed?(eg keeping own login and password secure, virus protection, backing up data, maintaining personal file area) Provide details of how you ensured that your data was secure. Provide details of how you maintained/organised your own personal file area.