Tutor Module for Key Skills it level 2 Test Skill Area 5 Standard ways of working with it



Download 0.64 Mb.
Page1/5
Date28.05.2018
Size0.64 Mb.
#51560
  1   2   3   4   5
Tutor Module for Key Skills IT Level 2 Test

Skill Area 5 – Standard ways of working with IT

5.1 Ensure work is accurate and clear and is saved appropriately



Skill Area 5 – Standard ways of working with IT 1

5.1 Ensure work is accurate and clear and is saved appropriately 1

Questions may, for example, require candidates to: 1

Standard ways of working with IT 1

Security of information 2

Security of Internet data source 2

Security of verbal data source 2

Security of written data source 2

Spelling and grammar 3

Shortcuts to Spellchecker and Thesaurus 3

Proofreading techniques 4

Manuscript correction signs – shortcuts to highlight errors 4

Checking overall layout 5

Advantage of Zoom 5

Security of Information 5

Copyright Law 5

1988 Copyright, Designs and Patents Act © 6

Data Protection Act 6

What you shouldn’t do: 7

What you should do is: 7

How to secure data against loss 7

Ways in which data can be lost on computer: 7

Tip on saving work: 8

Recap on housekeeping using Word, Excel, etc 8

Re-cap on housekeeping using Windows Explorer 9

Desktop shortcut 10

File structures 10

Physical and mental stress 11

Potential IT hazards 12

Manuscript correction signs 13

Practice questions 14

BBC and QCA practice test papers – Key Skills in IT Level 2 16



Skill Area 5 – Standard ways of working with IT




5.1 Ensure work is accurate and clear and is saved appropriately

Candidates need to understand ways in which IT can help with their work, and be able to compare the use of IT with other methods, in order to appreciate both the advantages and disadvantages of using IT. Candidates should be aware that information stored in a computer should be accurate, consistent and reliable, and that it should be stored securely.



Questions may, for example, require candidates to:





  1. identify different types of inaccuracy (including mistakes in content, spelling, grammar and lay out);

  2. identify ways of checking information for accuracy (including proof-reading, spell checking, using print preview, grammar checking, identifying and verifying sources, asking others);

  3. identify sensitive information (including health records, police records, pay records, bank statements, credit card statements) and ways of keeping it confidential (including physical security, passwords);

  4. identify material that may be copyright and the purpose of copyright protection;

  5. identify ways that information may be damaged (including viruses, vandalism, breakdown, accidental damage, theft) and how its loss may be prevented (including backup files, keeping original paper records);

  6. identify ways of recovering from data loss (including backup of data files to a secure medium, saving data files often and with different filenames, keeping a log of changes);

  7. identify and define suitable directory (folder) structures for storing files;

  8. identify types of physical stress potentially related to using IT systems (including RSI, visual fatigue) and ways of reducing these problems (including equipment position, seating, lighting, breaks);

  9. identify potential hazards in IT workplaces (including power supplies, cable lay out, position of equipment).

Standard ways of working with IT

There are many reasons for having standard ways of working with IT. Candidates need to know that information in IT systems can easily be lost or misused. They also need to know how to check if information sources are secure and honest and how to check for spelling, punctuation and grammatical errors.


Security of information





  • Unauthorised people may gain access to confidential information.

  • People may copy original work and present it as their own.

  • Files may be lost, corrupted by a virus or damaged in other ways.

  • Computers or disks may be damaged so information stored in them cannot be recovered.

  • Inaccurate or poorly written information may confuse or annoy readers.

  • Information presented professionally may be believed, even though it may be inaccurate.

  • Poorly laid-out workplaces may cause physical stress or be hazardous to IT operators, which may result in a security risk to information.



Security of Internet data source

Ensure the source of information is correct, i.e:



  • If this is from the Internet, can it be trusted?

  • Is it from a legitimate site?

  • Does it have a security padlock at the bottom right-hand corner to show it’s a secure site?



Security of verbal data source

If someone has given the information verbally, are they:



  • Telling the truth?

  • Are they to be trusted?

  • Are they an authority or just a passing acquaintance giving their opinion?



Security of written data source

If you’ve read about the subject, is it from:



  • A well-known magazine or paper (who could be in trouble if they publish inaccurate work)?

  • A comic (which might take a humorous stand on a serious subject)?

  • Out-of-date or a recent publication?





Download 0.64 Mb.

Share with your friends:
  1   2   3   4   5




The database is protected by copyright ©ininet.org 2024
send message

    Main page