Cover for DPPeriod 1 – 11C
Continue with coursework
Remember to use the mark sheet in shared
files (shared/ICT/GCSE ICT/Grades/coursework marks 2006-8.xls) to work out any
improvements or gaps that you need to fill in.
Jess D and Jess H:
Make sure that you use text fields not
lookups to start off with when you are providing evidence of your database
implementation – you will “discover” that you can use lookups later, once you
have “discovered” that you need a text field for phone number …
Matt H – concentrate on project 2 for now.
Josh houchin to sit away from Matt P and others, to allow him to concentrate on own work …
Sally and Beccy – we were talking about tests that you should do – have you actually tested that you can do your user
requirements yet? If not, then you should try to do the specific examples that
you gave.
Toby and Jake
Now that you are about to start setting up
your databases (compare your plans with the sample data structure in the design
folder in shared files for ideas on what to include), you’ll need to provide
evidence of setting up as you go along.
Go to Shared/ICT/GCSE ICT/project
2/implementation/implementation template.doc
READ THE INSTRUCTIONS! – you need to set up
your DB and provide evidence of what
you are doing using screenshots
and annotations. The foundation tasks are in red, and the higher tasks are in
blue.
Louise – make sure that you provide
evidence of the following when you et up your DB:
Setting field sizes
Setting validation
Creating queries
Periods 2-4 Year 10s
Complete write up for Data protection act
and copyright act.
Go through mark sheet in shared files to ID
remaining tasks for improvement.
Dom Cowles, Owen Moseley and Oliver holtom:
concentrate on the improvements that we discussed in lessons over the past
couple of days. DO NOT start anything new until you are up to date.
Dom and Owen to sit by themselves without
opportunities for contact with others.
Research task (NOT FOR Dom, Owen and
Oliver!)
You’ll need to write up some advice for the
film club about security from online threats – first of all, you need to start
to get an idea of what threats are out there
In a new word doc called “online threats”,
give definitions of the following:
- Virus
- Worm
- Spam
- Phishing
- Spyware
- Scumware
- Adware
- Zombie
- Botnet
- Denial of service attack
- Social engineering
- Trojan
- Dialler
- keylogger
- blacklist
- whitelist
Blogged with Flock