OCR Cambridge Nationals in Information technologies exam revision plan

Size: px
Start display at page:

Download "OCR Cambridge Nationals in Information technologies exam revision plan"

Transcription

1 Below is recommended revision plan for OCR Cambridge Nationals in Information technologies. As exam for this subject is very close, you should ideally spend at least three hours a week revising exam topics using the text book and the revision notes. Remember exam is only based on LO1, LO3, LO4 and LO6. LO1: Understand the tools and techniques that can be used to initiate and plan solutions Revision week Main topics Subtopics Book pages to Phases of project life cycle and tasks to be carried out in each phase The interaction and iteration between phases Input and output for each phase Initial project considerations Phases of project life cycle Initiation phase Planning phase Execution phase Evaluation phase Advantages of following a project life cycle Interaction between phases Difference between interaction and iteration Initiation phase inputs Initiation phase outputs and planning phase inputs Planning phase outputs and execution phase inputs Execution phase outputs and evaluation phase inputs Evaluation phase outputs SMART goals User requirements Success criteria Constraints or limitations Time and resources constraints Exam questions to practice

2 Planning tools and software types used to develop project plan Regulations Security and risk managements Mitigation of risks The purpose and importance of setting objectives The purpose of planning tools Gantt chart PERT chart Critical path Visualisation diagram Flow chart Mind map Task list Components of planning tools Advantages and disadvantages of planning tools Software types used Project management software Spreadsheets Word processors Desktop publishing

3 LO3: Understand how data and can be collected, stored and used Data What is data? Data types and how they are used? Information What is? How data and are related? Methods used to collect data and store data/ Different storage methods and the appropriateness of use of these in context The use of data, benefits and drawbacks of use of data The methods used to collect and store data/ Appropriateness of data collection methods Information technology used to support data collection The cloud Physical devices Big data Application and interaction of data stores The benefit and drawbacks of the use of data

4 LO4: Understand the factors to be considered when collecting and processing data and storing data/ Types of threats The vulnerabilities that can be exploited in a cyber-security attack The impact and consequences of a cyber-security attack Prevention measures Current relevant IT legislation, its implications and applications The importance of validity, reliability and bias when collecting and using data and Botnet Malware Social Engineering Hacking Distributed Denial of Service (DDoS) Pharming The environmental vulnerabilities Physical vulnerabilities System vulnerabilities The impact of a cyber-security attack The consequence of the cyber-security attack Physical prevention measures Logical prevention measures Secure destruction of data Legal protection The Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Health and Safety at Work Act Freedom of Information Act Ethical and moral issues Validity Reliability Bias

5 LO6: Understand the different methods of processing data and presenting Selection and justification of the appropriate software tools and techniques to process data Selection and justification of the appropriate tools and techniques to present The resources required for presenting Spreadsheets Databases The selection of appropriate tools and techniques to present The purpose and suitability of methods of presenting The advantages and disadvantages of methods for presenting Hardware requirements Software requirements Connectivity requirements