Tutor Module for Key Skills IT Level 2 Test
5.1 Ensure work is accurate and clear and is saved appropriately
Skill Area 5 – Standard ways of working with IT 1
5.1 Ensure work is accurate and clear and is saved appropriately 1
Questions may, for example, require candidates to: 1
Standard ways of working with IT 1
Security of information 2
Security of Internet data source 2
Security of verbal data source 2
Security of written data source 2
Spelling and grammar 3
Shortcuts to Spellchecker and Thesaurus 3
Proofreading techniques 4
Manuscript correction signs – shortcuts to highlight errors 4
Checking overall layout 5
Advantage of Zoom 5
Security of Information 5
Copyright Law 5
1988 Copyright, Designs and Patents Act © 6
Data Protection Act 6
What you shouldn’t do: 7
What you should do is: 7
How to secure data against loss 7
Ways in which data can be lost on computer: 7
Tip on saving work: 8
Recap on housekeeping using Word, Excel, etc 8
Re-cap on housekeeping using Windows Explorer 9
Desktop shortcut 10
File structures 10
Physical and mental stress 11
Potential IT hazards 12
Manuscript correction signs 13
Practice questions 14
BBC and QCA practice test papers – Key Skills in IT Level 2 16
Skill Area 5 – Standard ways of working with IT
5.1 Ensure work is accurate and clear and is saved appropriately
Candidates need to understand ways in which IT can help with their work, and be able to compare the use of IT with other methods, in order to appreciate both the advantages and disadvantages of using IT. Candidates should be aware that information stored in a computer should be accurate, consistent and reliable, and that it should be stored securely.
Questions may, for example, require candidates to:
identify different types of inaccuracy (including mistakes in content, spelling, grammar and lay out);
identify ways of checking information for accuracy (including proof-reading, spell checking, using print preview, grammar checking, identifying and verifying sources, asking others);
identify sensitive information (including health records, police records, pay records, bank statements, credit card statements) and ways of keeping it confidential (including physical security, passwords);
identify material that may be copyright and the purpose of copyright protection;
identify ways that information may be damaged (including viruses, vandalism, breakdown, accidental damage, theft) and how its loss may be prevented (including backup files, keeping original paper records);
identify ways of recovering from data loss (including backup of data files to a secure medium, saving data files often and with different filenames, keeping a log of changes);
identify and define suitable directory (folder) structures for storing files;
identify types of physical stress potentially related to using IT systems (including RSI, visual fatigue) and ways of reducing these problems (including equipment position, seating, lighting, breaks);
identify potential hazards in IT workplaces (including power supplies, cable lay out, position of equipment).
Standard ways of working with IT
There are many reasons for having standard ways of working with IT. Candidates need to know that information in IT systems can easily be lost or misused. They also need to know how to check if information sources are secure and honest and how to check for spelling, punctuation and grammatical errors.
Security of information
Unauthorised people may gain access to confidential information.
People may copy original work and present it as their own.
Files may be lost, corrupted by a virus or damaged in other ways.
Computers or disks may be damaged so information stored in them cannot be recovered.
Inaccurate or poorly written information may confuse or annoy readers.
Information presented professionally may be believed, even though it may be inaccurate.
Poorly laid-out workplaces may cause physical stress or be hazardous to IT operators, which may result in a security risk to information.
Ensure the source of information is correct, i.e:
If this is from the Internet, can it be trusted?
Is it from a legitimate site?
Does it have a security padlock at the bottom right-hand corner to show it’s a secure site?
Security of verbal data source
If someone has given the information verbally, are they:
Telling the truth?
Are they to be trusted?
Are they an authority or just a passing acquaintance giving their opinion?
If you’ve read about the subject, is it from:
A well-known magazine or paper (who could be in trouble if they publish inaccurate work)?
A comic (which might take a humorous stand on a serious subject)?
Out-of-date or a recent publication?
Share with your friends: |