Itq internet l2


Published on

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Itq internet l2

  1. 1. EVIDENCE CHECKLISTS FOR USE WITH IT USER Completed evidence checklists must be submitted with candidate work. A completed evidence checklist must be submitted for each unit. Failure to submit a correctly completed evidence checklist with candidate work will result in the work being returned to the centre and delay certification. Centre assessors MUST assess the candidate’s work prior to submission • Where the assessment objective has been met, indicate with Y in the Centre Assessor column. Only units that have been achieved should be submitted for moderation. Please note that where candidates are required to demonstrate amendments/replacements/moves/deletions, before and after evidence will need to be submitted. Examples are for information only, they do not form a definitive list of options. However, the guidance on word length, number of alternatives to be included or discussed must be followed. Evidence checklists for all units are available to download in word format from the OCR website.
  2. 2. OCR Level 2 ITQ 2009 Evidence Checklist and Evidence Guide for: Unit 40: Using the Internet Level 2 (Credit Value 4) Candidate Name: Centre Number: A completed evidence checklist must be submitted with every unit to ensure all evidence required for the assessment and achievement of the unit has been produced. No substitute is permitted. This unit can be achieved through one or more tasks. Please note that where candidates are required to demonstrate amendments/replacements/moves/deletions, before and after evidence will need to be submitted. Centre assessors must assess candidates’ by referring to the learning outcomes and assessment criteria for the unit concerned. Units not achieved should not be submitted to OCR. The centre assessor must submit this form with candidate work. All pages must be numbered and the page number referenced on this form. The examples given are indicative of the learning context at each level and are not intended to form a prescriptive list for the purpose of assessment. Centre Completion by: Candidate Assessor B1 Connect to the Internet. Page Number, Filename or Location B1.1/ Get online with an Internet connection: B1.2/ B1.3/ • identify different types of connection methods that B1.4 can be used to access the Internet • use help facilities to solve any Internet connection problems • include the benefits and drawbacks of the connection method used. Examples: Connection methods: LAN, VPN, modem, router, wireless, dial-up, broadband; cable, DSL; mobile phone with wireless application protocol (WAP) or 3rd Generation (3G) technology; intranet server (eg via parallel, serial or USB connections). Benefits and drawbacks of connection methods: speed, stability, services offered by ISP, accessibility. Evidence requirements: The candidate should briefly identify a minimum of four different connection methods and identify the benefits and drawbacks of each.
  3. 3. Centre Completion by: Candidate Assessor B2 Use browser software to navigate webpages Page Number, effectively. Filename or Location B2.1/ Select and use browser tools to: B2.2/ B2.3/ • navigate webpages B2.4 • adjust browser settings to optimise performance and meet needs • identify when to change settings to aid navigation • identify ways to improve the performance of a browser. Examples: Browser tools: enter, back, forward, refresh, stop, history, bookmark, new window, new tab. Toolbar, search bar, address bar; home, go to, follow link, URL, save web address. Browser performance: delete cache, delete temporary files, work offline, save websites. Browser settings: homepage, autofill, cookies, security, pop-ups, appearance, privacy, search engine, toolbars, zoom, personalisation, accessibility; software updates, temporary file storage. Evidence requirements: Using a scenario for a specific need, navigate through a minimum of four different webpages, altering the browser settings at least four times, to aid navigation. Centre Completion by: Candidate Assessor B3 Use browser tools to search for information from the Page Number, Internet. Filename or Location B3.1/ Select and use appropriate search techniques to: B3.2/ B3.3/ • locate information efficiently B3.4 • describe how well information meets requirements • manage and use references to make it easier to find information another time • download, organise and store different types of information from the Internet. Examples: Search techniques: search key words, quotation marks, search within results, relational operators, ‘find’ or search tool, turn questions into key words for an online query; choice of search engine, wild cards; Boolean operators. Information requirements: reliability, accuracy, currency, sufficiency, synthesise information from a variety of sources. Recognise intention and authority of provider, bias, level of detail; relevance. References: history, favourites, bookmarks; links, log useful sites, RSS, data feeds, saved search results. Download information: Webpage, website; Images, text, numbers, sound, games, video, TV, music.
  4. 4. Evidence requirements: Using a scenario, (possibly the one used in section B2), carry out a minimum of three different searches using a minimum of three different searching techniques. Identify the most appropriate site and describe how well it meets the requirements. Use at least three references to make it easier to find information another time. Download and save four different types of information from the Internet. Centre Completion by: Candidate Assessor B4 Use browser software to communicate information Page Number, online. Filename or Location B4.1/ Select and use appropriate tools and techniques to: B4.2/ B4.3/ • communicate information online B4.4 • identify opportunities to create post or publish material to websites • use browser tools to share information sources with others • submit information online. Examples: Communicate information: saved information (pod-casts, text, images), real time information (blogs, instant messaging), file transfer protocol [FTP], hypertext transmission protocol [http], VOIP. Share information: send link, send webpage, photographs, calendar, feeds. Submit information: fill-in and submit web forms; ratings, reviews, recommendations; wikis; discussion forums; interactive sites; netiquette. Evidence requirements: Take part in an online group or discussion, send or upload saved or live information, giving a minimum of two examples. Post a minimum of three comments on an internet forum or fill in and submit three web forms or reviews. Send at least two of the following: link, webpage, photograph, calendar or feeds.
  5. 5. Centre Completion by: Candidate Assessor B5 Understand the need for safety and security practices Page Number, when working online. Filename or Location B5.1/ Describe and explain the following: B5.3/ B5.5/ • threats to system performance when working online B5.6/ • threats to information security when working online B5.8 • threats to user safety when working on line • how to minimise internet security risks • the importance of the relevant laws affecting Internet users. Examples: Threats to system performance: unwanted e- mail (often referred to as “spam”), malicious programs (including viruses, worms, trojans, spyware, adware and rogue diallers) and hackers; hoaxes. Threats to information security: malicious programs (including viruses, worms, trojans, spyware, adware and rogue diallers), hackers, phishing and identity theft. Threats to user safety: abusive behaviour (“cyber bullying”), inappropriate behaviour and grooming; abuse of young people; false identities; financial deception. Minimise risk: virus- checking software, anti-spam software, firewall; treat messages, files, software and attachments from unknown sources with caution, internet settings, block sites, parental controls. Evidence requirements: Briefly describe task(s) using the bullet points above. B5.2/ Work responsibly and take appropriate precautions when B5.4/ working online: B5.7 • safety and security • manage personal access to online sources securely • apply laws, guidelines and procedures for safe and secure Internet use. Examples: Safety precautions: firewall settings, Internet security settings; carry out security checks, report inappropriate behaviour; report security threats or breaches; netiquette, content filtering, avoid inappropriate disclosure of information, proxy servers. Personal access: username and password/PIN selection and management, password strength, online identity/profile; Real name, pseudonym, avatar; What personal information to include, who can see the information, withhold personal information. Guidelines and procedures: Set by employer or organisation relating to Health and Safety, security; equal opportunities, disability. Laws: relating to copyright, software download and licensing, digital rights, IPR, health and safety.
  6. 6. Evidence requirements: The candidate should demonstrate that they can work responsibly and take appropriate safety and security precautions when working online. They should demonstrate that they manage the security of their personal information and follow relevant laws, guidelines and procedures for the use of the Internet. I state that the evidence for this unit is included on the specified printouts (or saved electronic files) indicated above. Candidate Name: Date: Assessor Name: Date: