Micro-Scholarship, What it is, How can it help me.pdf
Itq internet l2
1. EVIDENCE CHECKLISTS FOR USE WITH IT USER
Completed evidence checklists must be submitted with candidate work.
A completed evidence checklist must be submitted for each unit. Failure to submit a correctly
completed evidence checklist with candidate work will result in the work being returned to the
centre and delay certification.
Centre assessors MUST assess the candidate’s work prior to submission
• Where the assessment objective has been met, indicate with Y in the Centre Assessor
column.
Only units that have been achieved should be submitted for moderation.
Please note that where candidates are required to demonstrate
amendments/replacements/moves/deletions, before and after evidence will need to be
submitted.
Examples are for information only, they do not form a definitive list of options.
However, the guidance on word length, number of alternatives to be included or
discussed must be followed.
Evidence checklists for all units are available to download in word format from the OCR
website.
2. OCR Level 2 ITQ 2009
Evidence Checklist and Evidence Guide for:
Unit 40: Using the Internet Level 2 (Credit Value 4)
Candidate Name: Centre Number:
A completed evidence checklist must be submitted with every unit to ensure all evidence
required for the assessment and achievement of the unit has been produced. No substitute is
permitted.
This unit can be achieved through one or more tasks.
Please note that where candidates are required to demonstrate
amendments/replacements/moves/deletions, before and after evidence will need to be
submitted. Centre assessors must assess candidates’ by referring to the learning
outcomes and assessment criteria for the unit concerned. Units not achieved should
not be submitted to OCR.
The centre assessor must submit this form with candidate work. All pages must be
numbered and the page number referenced on this form. The examples given are
indicative of the learning context at each level and are not intended to form a prescriptive
list for the purpose of assessment.
Centre
Completion by: Candidate
Assessor
B1 Connect to the Internet. Page Number,
Filename or
Location
B1.1/ Get online with an Internet connection:
B1.2/
B1.3/ • identify different types of connection methods that
B1.4 can be used to access the Internet
• use help facilities to solve any Internet connection
problems
• include the benefits and drawbacks of the
connection method used.
Examples: Connection methods: LAN, VPN, modem,
router, wireless, dial-up, broadband; cable, DSL; mobile
phone with wireless application protocol (WAP) or 3rd
Generation (3G) technology; intranet server (eg via
parallel, serial or USB connections). Benefits and
drawbacks of connection methods: speed, stability,
services offered by ISP, accessibility.
Evidence requirements: The candidate should briefly
identify a minimum of four different connection
methods and identify the benefits and drawbacks of
each.
3. Centre
Completion by: Candidate
Assessor
B2 Use browser software to navigate webpages Page Number,
effectively. Filename or
Location
B2.1/ Select and use browser tools to:
B2.2/
B2.3/ • navigate webpages
B2.4 • adjust browser settings to optimise performance and
meet needs
• identify when to change settings to aid navigation
• identify ways to improve the performance of a browser.
Examples: Browser tools: enter, back, forward, refresh,
stop, history, bookmark, new window, new tab. Toolbar,
search bar, address bar; home, go to, follow link, URL,
save web address. Browser performance: delete cache,
delete temporary files, work offline, save websites.
Browser settings: homepage, autofill, cookies, security,
pop-ups, appearance, privacy, search engine, toolbars,
zoom, personalisation, accessibility; software updates,
temporary file storage.
Evidence requirements: Using a scenario for a specific
need, navigate through a minimum of four different
webpages, altering the browser settings at least four
times, to aid navigation.
Centre
Completion by: Candidate
Assessor
B3 Use browser tools to search for information from the Page Number,
Internet. Filename or
Location
B3.1/ Select and use appropriate search techniques to:
B3.2/
B3.3/ • locate information efficiently
B3.4 • describe how well information meets requirements
• manage and use references to make it easier to find
information another time
• download, organise and store different types of
information from the Internet.
Examples: Search techniques: search key words,
quotation marks, search within results, relational operators,
‘find’ or search tool, turn questions into key words for an
online query; choice of search engine, wild cards; Boolean
operators. Information requirements: reliability, accuracy,
currency, sufficiency, synthesise information from a variety
of sources. Recognise intention and authority of provider,
bias, level of detail; relevance. References: history,
favourites, bookmarks; links, log useful sites, RSS, data
feeds, saved search results. Download information:
Webpage, website; Images, text, numbers, sound, games,
video, TV, music.
4. Evidence requirements: Using a scenario, (possibly
the one used in section B2), carry out a minimum of
three different searches using a minimum of three
different searching techniques. Identify the most
appropriate site and describe how well it meets the
requirements. Use at least three references to make it
easier to find information another time. Download and
save four different types of information from the
Internet.
Centre
Completion by: Candidate
Assessor
B4 Use browser software to communicate information Page Number,
online. Filename or
Location
B4.1/ Select and use appropriate tools and techniques to:
B4.2/
B4.3/ • communicate information online
B4.4 • identify opportunities to create post or publish material
to websites
• use browser tools to share information sources with
others
• submit information online.
Examples: Communicate information: saved information
(pod-casts, text, images), real time information (blogs,
instant messaging), file transfer protocol [FTP], hypertext
transmission protocol [http], VOIP. Share information:
send link, send webpage, photographs, calendar, feeds.
Submit information: fill-in and submit web forms; ratings,
reviews, recommendations; wikis; discussion forums;
interactive sites; netiquette.
Evidence requirements: Take part in an online group
or discussion, send or upload saved or live
information, giving a minimum of two examples. Post
a minimum of three comments on an internet forum or
fill in and submit three web forms or reviews. Send at
least two of the following: link, webpage, photograph,
calendar or feeds.
5. Centre
Completion by: Candidate
Assessor
B5 Understand the need for safety and security practices Page Number,
when working online. Filename or
Location
B5.1/ Describe and explain the following:
B5.3/
B5.5/ • threats to system performance when working online
B5.6/ • threats to information security when working online
B5.8 • threats to user safety when working on line
• how to minimise internet security risks
• the importance of the relevant laws affecting Internet
users.
Examples: Threats to system performance: unwanted e-
mail (often referred to as “spam”), malicious programs
(including viruses, worms, trojans, spyware, adware and
rogue diallers) and hackers; hoaxes. Threats to
information security: malicious programs (including viruses,
worms, trojans, spyware, adware and rogue diallers),
hackers, phishing and identity theft. Threats to user safety:
abusive behaviour (“cyber bullying”), inappropriate
behaviour and grooming; abuse of young people; false
identities; financial deception. Minimise risk: virus-
checking software, anti-spam software, firewall; treat
messages, files, software and attachments from unknown
sources with caution, internet settings, block sites, parental
controls.
Evidence requirements: Briefly describe task(s) using
the bullet points above.
B5.2/ Work responsibly and take appropriate precautions when
B5.4/ working online:
B5.7
• safety and security
• manage personal access to online sources securely
• apply laws, guidelines and procedures for safe and
secure Internet use.
Examples: Safety precautions: firewall settings, Internet
security settings; carry out security checks, report
inappropriate behaviour; report security threats or
breaches; netiquette, content filtering, avoid inappropriate
disclosure of information, proxy servers. Personal access:
username and password/PIN selection and management,
password strength, online identity/profile; Real name,
pseudonym, avatar; What personal information to include,
who can see the information, withhold personal
information. Guidelines and procedures: Set by employer
or organisation relating to Health and Safety, security;
equal opportunities, disability. Laws: relating to copyright,
software download and licensing, digital rights, IPR, health
and safety.
6. Evidence requirements: The candidate should
demonstrate that they can work responsibly and take
appropriate safety and security precautions when
working online. They should demonstrate that they
manage the security of their personal information and
follow relevant laws, guidelines and procedures for the
use of the Internet.
I state that the evidence for this unit is included on the specified printouts (or saved
electronic files) indicated above.
Candidate Name: Date:
Assessor Name: Date: