£0

Cambridge National Level 1/2 Information Technologies Edition 2018 (PDF)

Reviews:
(3)
Price:  £16
Main specifications
All specifications
PDF book:

✔️Immediate download
✔️Highlighting, editing, saving and printing are available
✔️The same content as in a hardcover book
✔️Search for words within the text
✔️For any PDF file viewers and devices

How to download

Register on this website and pay for your selected book.
After you have paid, go to "My Account"-"Downloads" section. There you will see a PDF file. Download and open it. It contains a link to download your book. Click on the link and download your book.
You can send us a message that you want to receive the book to your e-mail, and a link to download the book will also be sent to your e-mail.

About the book:


Publisher: Hodder Education
Author (s): Brian Gillinder, Sonia Stuart
Pages: 182
Edition: 2018
Language: English
Size: 61 Mb


Content:


Learning Outcome 1; Understand the tools and techniques that can be used to initiate and plan solutions
1.1 The phases of the project life cycle and the tasks carried out in each phase . . 2
1 .2 The interaction and iteration between the phases of the project life cycle . . . . 5
1 .3 The inputs and outputs of each phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1 .4 Initial project considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
1 .5 Planning tools and the software types used to develop project plans ............. 14
Learning Outcome 2: To be able to initiate and plan a solution to meet an identified need
2.1 How to initiate a project by analysing the requirements in a given context . . . 23
2.2 How to mitigate risks through the planning process......................................... 26
2.3 How to create and use planning documentation ............................................... IT
2.4 How to undertake iterative testing ...................................................................... 34
Learning Outcome 3: Understand how data and information can be collected, stored and used
3.1 Data......................................................................................................................... 38
3.2 Information ............................................................................................................ 40
3.3 The methods used to collect data and store data/information and the IT used to support data collection .........................................................41
3.4 Different storage methods and the appropriateness of the use of these in context .................................................................................................................. 50
3.5 The use of data, the applications and interaction of data stores, and the benefits and drawbacks of the use of data ......................................................... 52
Learning Outcome 4: Understand the factors to be considered when collecting and processing data and storing data/information
4.1 Types of threats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.2 The vulnerabilities that can be exploited in a cyber-security attack ............... 63
4.3 The impacts and consequences of a cyber-security attack . . . . . . . . . . . . . . . 68
4.4 Prevention measures ........................................................................................... 73
4.5 Current relevant IT legislation, its implications and applications . . . . . . . . . . 79
4.6 The importance of validity, reliability and bias when collecting and using data and information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Learning Outcome 5: To be able to import and manipulate data to develop a solution to meet an identified need
5.1 How to create, edit, delete and process data using appropriate software tools and techniques ............................................................................88
Learning Outcome 6: Understand the different methods of processing data and presenting information
6.1 Selection and justification of the appropriate software tools and techniques to process data to meet the defined objectives in a given context . . . . . . . . . 120
6.2 Selection and justification of the appropriate tools and techniques to present information, including their purpose, suitability, and advantages and disadvantages ............................................................................................. 123
6.3 The resources required for presenting information . . . . . . . . . . . . . . . . . . . . 137
Learning Outcome 7: To be able to select and present information in the development of the solution to meet an identified need
7.1 How to select and extract data for an identified need .................................... 141
7.2 How to present information using appropriate software tools and techniques .......................................................................................................... 141
Learning Outcome 8: To be able to iteratively review and evaluate the development of the solution
8.1 How to carry out and document an iterative review......................................... 158
Glossary ........................................................................................................................... 161
Index ................................................................................................................................. 164

Tags: Cambridge National Level 1-2 Information Technologies pdf, Cambridge National Information Technologies pdf online

Specifications
Format of the book
PDF book
Reviews (3)
Romeo
Romeo
03/02/2023
Good book. Bought and use.
Everett
Everett
03/02/2023
Bought for my son. All perfectly.
Clark
Clark
02/10/2022
I recommend everyone. All fine.
0