Year 10 Syllabus in a nutshell
Information and Communication Technology
Year 10 Syllabus in a nutshell Information Communications Technology
IGCSE Information and Communication Technology encourages learners to develop lifelong skills, including:
understanding and using applications
using Information and Communication Technology (ICT) to solve problems
analysing, designing, implementing, testing and evaluating ICT systems, ensuring that they are fit for purpose
understanding the implications of technology in society, including social, economic and ethical uses
awareness of the ways ICT can help in home, learning and work environments.
Syllabus:
https://www.cambridgeinternational.org/programmes-and-qualifications/cambridge-igcse-information-and-
communication-technology-9-1-0983/
Text Book:
Cambridge iGCSE ICT Coursebook, Victoria Wright And Denise Taylor
Year 10 Theory (2 Single Lessons Each Week)
Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2
Unit 1 Types Of Unit 4
Computer Unit 3 Networks
Unit 5 Unit 6 Unit 6
Storage And
Topic The effectICT ICT
Unit 2 Input and Devices AndThe Effect Of
Of Using ICTApplication Applications
Output Devices Media Using
Them
Text Chapter 1 and ChapterChapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter. 6
Book References 2
Cambridge IGCSE
ICT Coursebook
Year 10 Practical (1 Double Lesson Each Week)
Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2
Topic Unit 11
File
Management
Unit 9 Audience
Unit 10
Unit 17 Unit 16
Unit 19 Unit 20 Unit 20
Communication Document Graphs
Presentation Data Analysis Data Analysis
Production And Charts
Unit 12 Images
Unit 13 Layout
Unit 14 Styles
Unit 15 Proofing
Text Chapter 11
Book
References Chapter 9
Cambridge Chapter 10
IGCSE
ICT Chapter 12 Chapter 17 Chapter 19 Chapter 20 Chapter 20 Chapter 16
Coursebook
Chapter 13
Chapter 14
Chapter 15
Year 11 Theory (2 Single Lessons Each Week)
Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2
Unit 8
Unit 7 The System Safety
Topic Revision Revision Exam Exam
Life Cycle And
Security
Text
Book References
Chapter 7 Chapter 8
Cambridge IGCSE
ICT Coursebook
Year 11 Practical (1 Double Lesson Each Week)
Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2
Topic Unit 18 Unit 21
Data Web Revision Revision Exam Exam
Manipulation Authoring
Text
Book
References
Chapter 18 Chapter 21
Cambridge
IGCSE
ICT
Coursebook
Types and Hardware and software
components of
computer define hardware as consisting of physical components of a computer system
systems identify internal hardware devices (e.g. processor, motherboards, random
access memory (RAM), read-only memory (ROM), video cards, sound cards
and internal hard disk drives)
identify external hardware devices and peripherals (such as monitors,
keyboards, mice, printers as input and output devices and external storage
devices in general)
define software as programs for controlling the operation of a computer or
processing of electronic data
identify the two types of software – applications software and system
software
define applications software (e.g. word processing, spreadsheet, database
management systems, control
software, measuring software, applets and apps, photo editing software,
video editing software, graphics manipulation software)
define system software (e.g. compilers, linkers, device drivers, operating
systems and utilities)
The main components of computer systems
describe the central processing unit (CPU) including its role
describe internal memory, i.e. ROM and RAM and the differences between
them
define input and output devices and describe the difference between them
define secondary/backing storage
Operating systems
define and describe operating systems which contain a Command Line
Interface (CLI)
define and describe operating systems which contain a Graphical User
Interface (GUI)
describe the differences, including the benefits and drawbacks, between
operating systems which contain a CLI and those which contain a GUI
Types of computer
describe the characteristics of a personal/desktop computer and its uses,
both as a standalone and as a networked computer
describe the characteristics of a laptop computer and what it is used for,
both as a standalone and as a networked computer
describe the characteristics of a tablet computer and what it is used for,
including its ability to use wireless technology or 3G/4G technology
describe the computer characteristics of a smartphone and what it is used
for in computing terms
describe the advantages and disadvantages of each type of computer (as
above) in comparison with the others (as above)
Impact of emerging technologies
describe how emerging technologies are having an impact on everyday life
(e.g. artificial intelligence, biometrics, vision enhancement, robotics,
quantum cryptography, computer-assisted translation, 3D and holographic
imaging, virtual reality)
Input and output Input devices and their uses
devices
identify input devices and their uses, e.g. keyboard, numeric keypad,
pointing devices (such as mouse, touchpad, trackerball), remote control,
joystick/driving wheel, touch screen, scanners, digital cameras, microphone,
sensors (general), temperature sensor, pressure sensor, light sensor,
graphics tablet, video camera, webcam
Direct data entry and associated devices
describe direct data entry and associated devices, e.g. magnetic stripe
readers, chip and PIN readers, Radio Frequency Identification (RFID)
readers, Magnetic Ink Character Recognition/Reader (MICR), Optical Mark
Recognition/Reader (OMR), Optical Character Recognition/Reader (OCR),
bar code reader
identify the advantages and disadvantages of any of the above devices in
comparison with others
Output devices and their uses
identify output devices and their uses, e.g. CRT monitor, TFT/LCD monitor,
IPS/LCD monitor, LED monitor, touch screen (as an output device),
multimedia projector, laser printer, inkjet printer, dot matrix printer, wide
format printer, 3D printer, speakers, motors, buzzers, heaters, lights/lamps
describe the advantages and disadvantages of any of the above devices
Storage devices Storage devices and media
and media
identify storage devices, their associated media and their uses, e.g.
o magnetic backing storage media: fixed hard disks and drives,
portable and removable hard disks, portable and removable hard
drives, magnetic tape drives and magnetic tapes, memory cards
o optical backing storage media (CD/DVD/Blu-ray): CD ROM/DVD
ROM, CD R/DVD R, CD RW/DVD RW, DVD RAM, Blu-ray discs
o solid state backing storage: solid state drives (SSDs), flash drives
(pen drive/memory stick/USB stick)
describe the advantages and disadvantages of the above devices
Networks and Networks
the effects of
using them understand how a router works and its purpose
describe how networks and individual computers connect to the internet
describe how a router stores computer addresses
describe how it routes data packets
understand the use of other common network devices, including: network
interface cards, hubs, bridges, switches, modems
understand the use of WiFi and Bluetooth in networks
describe how computers can use WiFi to connect to a network
describe how computers can use Bluetooth to connect to a network
compare and contrast Bluetooth and WiFi
understand how to set up and configure a small network, including: access
to the internet, the use of a browser, the use of email, access to an Internet
Service Provider (ISP)
understand the characteristics and purpose of common network
environments, such as intranets and the internet
define what the internet is
define what an intranet is
describe the differences between an intranet and the internet
explain the purpose of an intranet and how that differs from the purpose of
the internet
describe the uses of an intranet
describe the uses of the internet
define the terms Local Area Network (LAN), Wireless Local Area Network
(WLAN) and Wide Area Network (WAN)
describe the differences between a LAN, a WLAN and a WAN
understand the advantages and disadvantages of using different types of
computer to access the internet
compare the advantages and disadvantages of using laptop computers,
desktop computers, tablet computers and smartphones to access the
internet
Network issues and communication
security issues regarding data transfer
describe the security issues surrounding the use of computer networks
describe other issues such as the idea that the internet is not policed and
the effects of this, such as the existence of inappropriate sites
identify methods of avoiding password interception (such as the use of anti-
spyware and changing passwords regularly)
describe the difference between strong and weak passwords
describe other authentication techniques (such as biometric methods,
magnetic stripes, id cards, passports, other physical tokens, retina scans, iris
scans, face scans)
describe the use of anti-virus software and other methods of avoiding
viruses (such as use of unknown storage media to transfer data, the risk of
downloading software from the internet)
define encryption and describe its use
list the principles of a typical data protection act
network communication
describe facsimile communication and describe the differences between
physical faxing (which does not require the use of a network) and electronic
faxing (which does require the use of a network)
describe email communication, including the use of attachments
describe the advantages and disadvantages of using email compared with
faxing
describe video-conferencing, including the hardware used
describe audio-conferencing
describe web-conferencing and how it can be linked to either video- or
audio-conferencing
The effects of Effects of IT on employment
using IT
describe how there has been a reduction of employment in offices, as
workers’ jobs have been replaced by computers in a number of fields (e.g.
payroll workers, typing pools, car production workers)
describe how there has been an increase in employment in other fields (e.g.
website designers, computer programmers, delivery drivers in retail stores)
Effects of IT on working patterns within organisations
describe how the use of computers has led to a number of employees
changing their working patterns (e.g. part-time working, flexible hours, job
sharing, compressed hours)
describe what is meant by part-time working, flexible hours, job sharing,
compressed hours
Microprocessor-controlled devices in the home
describe the positive effects microprocessors have on aspects of lifestyle
(e.g. the amount and use of leisure time, the degree of social interaction,
the ability to leave the home)
describe the negative effects microprocessors have on aspects of lifestyle
(e.g. lack of exercise)
Potential health problems related to the prolonged use of IT equipment
describe repetitive strain injury (RSI) and what causes it
identify other health issues (e.g. back problems, eye problems, headaches)
describe some simple strategies for preventing these problems
evaluate the use of IT equipment and develop strategies to minimise the
health risks
ICT applications Communication applications
Describe a range of communication applications (e.g. newsletters, websites,
multimedia presentations, music scores, cartoons, flyers and posters)
Describe the use of smartphones for communication (e.g. text messaging,
phone calls, accessing the internet)
Describe the use of internet telephony, including Voice over Internet
Protocol (VoIP)
Describe applications for publicity and corporate image publications (e.g.
business cards, letterheads, flyers and brochures)
Data handling applications
describe the use of a range of data handling applications (e.g. surveys,
address lists, clubs and society records, school reports and school libraries)
Measurement applications
describe a range of measurement applications (e.g. scientific experiments,
weather stations)
explain the difference between analogue data and digital data
explain the need for conversion between analogue and digital data
describe the use of microprocessors and computers in a number of
applications (e.g. pollution monitoring, intensive care units in hospitals)
discuss the advantages and disadvantages of using computers in
measurement rather than humans
Microprocessors in control applications
describe the role of a microprocessor or computer in control applications,
including the role of the pre-set value
describe the use of computer control in applications (e.g. turtle graphics,
automatic washing machines, automatic cookers, computer controlled
central heating systems, burglar alarms, computer controlled glasshouses)
Modelling applications
describe the use of computer modelling in spreadsheets (e.g. for personal
finance)
Applications in manufacturing industries
describe a range of computer controlled applications (e.g. robotics in
manufacture and production line control)
discuss the advantages and disadvantages of using computer controlled
systems rather than humans
School management systems
describe how systems are used to manage learner registration and
attendance
describe how systems can be used to record learner performance
describe how systems can be used for organising examinations, creating
timetables and managing teaching cover/substitution
Booking systems
identify areas where booking systems are used (e.g. travel industry, theatres
and cinemas)
describe the online processing involved in booking tickets
discuss the advantages and disadvantages of online booking systems
Banking applications
describe the computer processing involved in Electronic Funds Transfer
(EFT)
describe the computer processing involved in using automatic teller
machines (ATM) (e.g. withdrawing cash, depositing cash or cheques,
checking account balance, mini statements, smartphone/cellphone
recharge/top up, bill paying, money transfers, ordering paper-based goods)
describe the use of processing involved in credit/debit card transactions
describe the clearing of cheques
describe phone banking
describe internet banking, and discuss the advantages and disadvantages of
it
Computers in medicine
describe the contents of information systems in medicine (including patient
records, pharmacy records, monitoring and expert systems for diagnosis)
describe how 3D printers can be used in producing medical aids (e.g.
surgical and diagnostic aids, development of prosthetics and medical
products, tissue engineering, artificial blood vessels and the design of
medical tools and equipment)
Computers in libraries
describe the files used in libraries (e.g. records of books and borrowers)
describe the computer processing involved in the issue of books, including
the use of direct data entry methods
describe the automatic processing involved in issuing reminders for overdue
books
Expert systems
identify a range of applications which use expert systems (e.g. mineral
prospecting, car engine fault diagnosis, medical diagnosis, chess games)
identify the components of an expert system (e.g. interactive user interface,
inference engine, rules base, knowledge base)
describe how an expert system is used to suggest diagnoses
Computers in the retail industry
describe the use of point of sale (POS) terminals, how the stock file is
updated automatically, and how new stock can be ordered automatically
describe the use of electronic funds transfer at point of sale (EFTPOS)
terminals (e.g. the checking of the validity of cards, the use of chip and PIN,
the communication between the supermarket computer and the bank
computer)
describe internet shopping
discuss the advantages and disadvantages of internet shopping
Recognition systems
describe how recognition systems work (e.g. Magnetic Ink Character
Recognition (MICR), Optical Mark Recognition (OMR) and Optical Character
Recognition (OCR), Radio Frequency Identification Device (RFID))
describe how number plate recognition systems work
describe the processing of cheques
describe the processing of OMR media (e.g. school registers, multiple-choice
examination papers)
describe how RFID and RF technology is used in a range of applications (e.g.
tracking stock, passports, automobiles, contactless payment)
Monitoring and tracking systems
describe how a workforce or member of the public can be monitored or
logged
describe how the use of cookies can be used to monitor a person’s internet
activity
describe the use of key-logging
describe how worker/employee call monitors can be used
describe the use of automatic number plate recognition
Satellite systems
describe the use of different satellite systems (e.g. Global Positioning
Systems (GPS), satellite navigation, Geographic Information Systems (GIS),
media communication systems)
The systems life Analysis
cycle
Methods of researching an existing system
identify and describe methods of researching an existing system (e.g.
observation, interviews, questionnaires and examination of existing
documents)
discuss the disadvantages and advantages of the different methods
Recording and analysing information about the current system
describe the need to identify inputs, outputs and processing of the current
system
describe the need to identify problems with the current system
describe the need to identify the user and information requirements for the
new system
System specification
identify and justify suitable hardware for the new system
identify and justify suitable software for the new system
Design
describe how it is necessary to design documents, files, forms/inputs,
reports/outputs and validation
produce designs to solve a given problem
design data capture forms and screen layouts
design report layouts and screen displays
design validation routines (including length check, type check, format check,
presence check, check digit)
design the required data/file structures (e.g. field length, field name, data
type)
Development and testing
Testing designs
describe how data/file structures are created and tested
describe how validation routines are created and tested
describe how input methods are created and tested
describe how output formats are created and tested
Testing strategies
describe the need to test each module
describe the need to test the whole system
describe testing using normal data including definition and examples
describe testing using live data including definition and examples
describe testing using abnormal data including definition and examples
describe testing using extreme data including definition and examples
Improvements needed as a result of testing
describe how it may be necessary to improve the system and make changes
(e.g. data/file structures, validation routines, input methods, output formats
may need to be amended/improved)
Implementation
Different methods of system implementation
describe the four methods of implementation (direct changeover, parallel
running, pilot running, phased implementation)
Methods of implementation
identify suitable situations for the use of different methods of system
implementation
(e.g. organisations or departments within organisations which need a quick
changeover, organisations or departments within organisations which
cannot afford to lose data)
describe advantages and disadvantages of each method of implementation
Documentation
Technical documentation for an information system
explain the need for technical documentation
identify the components of technical documentation (e.g. purpose of the
system/program, limitations of the system, program listing, program
language, program flowcharts/algorithms, system flowcharts, hardware and
software requirements, file structures, list of variables, input format, output
format, sample runs/test runs, validation routines)
User documentation for an information system
explain the need for user documentation
identify the components of user documentation (e.g. purpose of the
system, limitations of the system, hardware and software requirements,
how to load/run/install software, how to save a file, how to print data, how
to add records, how to delete/edit records, input format, output format,
sample runs, error messages, error handling, troubleshooting
guide/helpline, frequently asked questions, glossary of terms)
Evaluation
describe the need to evaluate a solution in terms of the efficiency of the
solution, the ease of use of the solution, and the appropriateness of the
solution
describe the need for a variety of evaluation strategies, e.g.
compare the solution with the original task requirements
identify any limitations and necessary improvements to the system
evaluate the users’ responses to the results of testing the system
Safety and Physical safety
security
describe common physical safety issues and what causes them, e.g.
electrocution from spilling drinks, fire from sockets being overloaded or
equipment overheating, tripping over trailing cables
describe some simple strategies for preventing these issues
evaluate own use of IT equipment and develop strategies to minimise the
potential safety risks
eSafety
explain what is meant by personal data
explain why personal data should be confidential and protected
explain how to avoid inappropriate disclosure of personal data including:
own name, address, school name, a picture in school uniform
discuss why eSafety is needed
evaluate own use of the internet and use strategies to minimise the
potential dangers, e.g. only using websites recommended by teachers, only
using a learner-friendly search engine
evaluate own use of email and use strategies to minimise the potential
dangers, including only emailing people already known, thinking before
opening an email from an unknown person, never emailing the school’s
name or a picture of a learner in school uniform
evaluate own use of social media/networking sites, instant messaging and
internet chat rooms and use strategies to minimise the potential dangers,
including: knowing how to block and report unwanted users, never
arranging to meet anyone alone, always telling an adult first and meeting in
a public place, avoiding the misuse of images, using appropriate language,
respecting confidentiality
describe measures which should be taken when playing games on the
internet (including not using real names)
Security of data
Effective security of data
define the term hacking and describe its effects
explain what is meant by the term hacking and the measures that must be
taken in order to protect data
explain what is meant by the terms user id and password stating their
purpose and how they are used to increase the security of data
explain what is meant by the term biometric data and why biometric data
is used
Security of data online
explain what is meant by the term digital certificate and its purpose
explain what is meant by the term Secure Socket Layer (SSL)
describe the features of a web page that identify it as using a secure server
define the terms: phishing, pharming, smishing
describe the methods which can be used to help prevent phishing,
pharming and smishing
describe the potential for the malicious use of technology to collect
personal data, including: phishing, pharming, smishing
describe how it is possible to recognise when someone is attempting to
obtain personal data, report the attempt and avoid the disclosure of
information
explain the difference between moderated and unmoderated forums and
the relative security of these
explain the concept of and how to recognise spam mail and avoid being
drawn into it
describe what encryption is and why it is used
define the term computer virus and describe its effects
describe the effects of infecting a computer with a virus from a downloaded
file
describe how to take preventative action to avoid the danger of infecting a
computer with a virus from a downloaded file
describe the measures that must be taken in order to protect against
hacking
describe how it is possible to be the subject of fraud when using a credit
card online
explain the issues related to security of data in the cloud
explain the concept of a firewall and why it is used
discuss the effectiveness of different methods of increasing security
Audience Audience appreciation
show a clear sense of audience when planning and creating ICT solutions
analyse the needs of an audience
explain why solutions must meet the needs of the audience
Legal, moral, ethical and cultural appreciation
explain the need for copyright legislation and the principles of copyright
relating to computer software (e.g. software piracy)
describe methods that software producers employ to prevent software
copyright being broken
discuss the legal, moral, ethical and cultural implications of creating an ICT
solution
create ICT solutions that are responsive to and respectful of the needs of
the audience
discuss why the internet is not policed (although legislation is enforced in
some countries) and the effects of this, including the existence of
inappropriate sites
Communication Communication with other ICT users using email
describe the constraints that affect the use of email, including: the laws
within a country, acceptable language, copyright, local guidelines set by an
employer, the need for security, netiquette, password protection
define the term spam
explain why spam needs to be prevented
describe the methods which can be used to help prevent spam
explain why email groups are used
Effective use of the internet
Fundamentals of the internet
define the terms internet and intranet
explain the differences between the internet, an intranet and the World
Wide Web (WWW)
explain the concept of storage in the cloud
define and understand the terms: HyperText Transfer Protocol (HTTP),
HyperText Transfer Protocol secure variant (HTTPS), Uniform Resource
Locator (URL), hyperlink, Internet Service Provider (ISP), File Transfer
Protocol (FTP)
describe the structure of a web address
explain what a web browser is used for
explain what a search engine is used for
define the term blog and describe the use of a blog as a means of
communication
define the term wiki and describe the use of a wiki as a means of
communication
define the term social networking and describe the use of social networking
Websites as a means of communication
advantages and disadvantages of using the internet
explain why the internet is so popular, giving reasons such as the amount of
information available and the speed of accessing information
explain why an internet search to find relevant information is not always
fast
explain why it is not always easy to find reliable information on the internet
explain how to evaluate the reliability of information found on the internet
File management Manage files effectively
identify different file types and their use(s), for example: css, csv, gif, htm,
jpg, pdf, png, rtf, txt, zip
locate stored files
open and import files of different types
save files in a planned hierarchical directory/folder structure
save files using appropriate file names
save and print files in a variety of formats, including: a draft document, final
copy, screenshots, database reports, data table, graph/chart, a web page in
browser view, a web page in HTML view
save and export data into file formats for your applications packages, e.g.
.doc, .docx, .xls, .sdb, .sdc,
.rtf, .ppt
explain why generic file formats are needed
save and export data into generic file formats, including: .csv, .txt, .rtf, .pdf,
.css, .htm
Reduce file sizes for storage or transmission
explain the need to reduce file sizes for storage or transmission
identify where it will be necessary to reduce file sizes for storage or
transmission
reduce file sizes using file compression
Images use software tools to place and edit an image to meet the requirements of
its intended application and audience
Know when it is necessary to edit an image and can appropriately:
place an image with precision
resize an image
maintain or adjust the aspect ratio of an image, or distort an image, where
appropriate
crop an image
rotate an image
reflect an image (flip an image horizontally or vertically)
adjust the colour depth of an image
adjust the brightness of an image
adjust the contrast of an image
understand the need to reduce image resolution to increase transmission
speed
reduce the resolution of an image to reduce file size
Layout Use software tools to prepare a basic document to match the purpose and target
audience
create a new document or, where appropriate, open an existing document
enter text and numbers
use editing techniques to manipulate text and numbers, including: highlight,
delete, move, cut, copy, paste, drag and drop
place objects into the document from a variety of sources, including: text,
image, screenshot, spreadsheet extract, database extract, clip art or chart
create a table with a specified number of rows and columns
format a table and its contents
place text or objects in a table
wrap text around a table, chart or image, including: above, below, square
and tight
Use software tools to use headers and footers appropriately within a range of
software packages
create headers and footers
align consistently within a document the contents of the header and footer
including: to left margin, right margin and centre of the page
place automated objects in headers and footers, including: automated file
information, automated page numbering, text, date, time
explain why headers and footers are needed
Styles Understand the purpose of a corporate house style and ensure that all work
produced matches this
produce documents which conform to a corporate house style
explain what is meant by corporate branding/house style
apply styles to ensure consistency of presentation
explain why consistent styles are required
apply consistent styles using a variety of application packages
ensure that page/slide layout is consistent, including: font styles, text
alignment, spacing between lines, spacing between paragraphs, spacing
before and after headings
create and apply an appropriate style, including: font type (serif, sans serif),
point size, font colour, alignment, line spacing, style of bullets, text
alignment to the left, right, centre or fully justified
select an appropriate font style for a task, taking into account the audience
use text enhancement, including: bold, underline, italic, highlight
create and apply paragraph style(s) with a new style name to match the
corporate house style
Proofing Software tools
Use software tools to ensure that all work produced contains as few errors as
possible
explain why the automated suggestions given by spell check software do
not always give the correct response
use automated tools, including spell check facilities, to remove errors
use validation routines to minimise errors
explain why validation checks must be appropriate to the data that is being
checked
Proofing techniques
Accuracy of data entry
describe the importance of accuracy and the potential consequences of
data entry errors
correct errors in data entry, including: transposed numbers, incorrect
spelling, inconsistent character spacing, inconsistent case and factual errors
(following proofreading by a third party)
check to ensure consistent line spacing, remove blank pages/slides, remove
widows/orphans, ensure that tables and lists are not split over columns or
pages/slides
Verification
define the term verification
describe visual verification (i.e. visual comparison of data entered with a
data source)
describe double data entry (i.e. entering data twice and the computer
compares the two sets of data, either by comparing them after data has
been entered or by comparing them during data entry)
explain the need for validation as well as verification
Graphs and Produce a graph or chart from the given data
charts
select data to produce a graph/chart, including: using contiguous data, non-
contiguous data, and specified data ranges, where necessary
select the graph or chart type to match the required purpose and meet the
needs of the audience
label the graph or chart, including: chart title, legend, sector labels, sector
values, segment labels, segment values, percentages, category axis title,
value axis title, category axis labels, value axis labels, scales
add a second data series to a chart, as necessary
add a second axis to a chart, as necessary
change the maximum and minimum values of an axis scale to appropriate
values
enhance the appearance of a graph or chart, including: changing the colour
scheme or fill patterns, extracting a pie chart sector to meet the needs of
the audience
Document Format text and organise page layout
production
set page size
set page orientation
set page and gutter margins
set the number of columns
set the column width and spacing between columns
define the terms widow and orphan
explain why it is necessary to use page, section and column breaks, to adjust
pagination and to avoid widows and orphans
set and remove page, section and column breaks
set line spacing, including: single, 1.5 times, double, multiple, spacing before
and after paragraphs
set tabulation settings, including: indented paragraphs, hanging paragraphs
format text as bulleted or numbered lists to meet the needs of the audience
use software tools to edit tables
edit a table structure, where necessary, to include: insert row(s), delete
row(s), insert column(s), delete column(s), merge cells
set horizontal cell alignment: left, right, centre, fully justified
set vertical cell alignment: top, centre, bottom
format cells and the cell contents, including: show gridlines, hide gridlines,
wrap text within a cell, shading/colouring cells
mail merge a document with a data source
explain why mail merged documents are created
edit a master document to insert appropriate fields from a data source
insert special fields such as date
select records to merge
merge a document with selected fields
save and print merge master document
save and print selected merged documents, as appropriate
Data Create a database structure
manipulation
design and use suitable software tools to create an appropriate database
record structure
define the terms flat file database and relational database
explain where it would be appropriate to select a flat file database or a
relational database
assign appropriate data types to fields, including: text, numeric (integer,
decimal, percentage, currency), date/time, Boolean/logical (–1/0, yes/no,
true/false)
explain that other field types such as placeholders for media, including
images, sound bites and video clips are used in commercial databases
use short, meaningful file and field names
format fields and identify sub-types, including: specifying the number of
decimal places, specifying a particular currency
identify the structure of external data with different file types, including:
.csv, .txt, .rtf
locate, open and import data from an existing file
define and understand the terms primary key and foreign key and their role
in a relational database
create a relationship between two or three tables
discuss the advantages and disadvantages of using relational tables rather
than a flat file database
design and use suitable software tools to create a data entry form
appropriate to purpose and audience
understand the key features of form design
create a data entry form to meet the needs of the audience
create a data entry form with all fields included to match the purpose of the
task
create an appropriate data entry form, including: appropriate font styles
and sizes, spacing between fields, character spacing of individual fields, use
of white space, radio buttons, drop down menus, highlighting key fields
Manipulate data
use arithmetic operations or numeric functions to perform calculations
within a database
create a calculated field
perform calculations at run time using formulae and functions, including:
addition, subtraction, multiplication, division, sum, average, maximum,
minimum, count
use suitable software tools to sort data appropriately in a database
sort data using a single criterion and using multiple criteria where
necessary, into ascending or descending order
use suitable software tools to search a database to select subsets of data
perform suitable searches using a single criterion and using multiple criteria,
on different field types such as alphanumeric, numeric, Boolean
perform searches using a variety of operators including: AND, OR, NOT,
LIKE, >, <, =, >=, <=, <>
perform searches using wildcards, as appropriate
Present data
use suitable software tools to produce reports to display data appropriate
to purpose and audience
produce reports to display all the required data and labels in full where
required
use appropriate headers and footers within a database report, including:
report header, report footer, page header, page footer
set report titles
produce different output layouts as required, including: tabular format,
labels
align data and labels appropriately, including: right aligning numeric data
and decimal alignment
format numeric data, including: number of decimal places, variety of
currencies, percentage, as required by the task
show and hide data and labels within a report, as necessary
export data for use in another application
Presentations Use a master slide to appropriately place objects and set suitable styles to meet
the needs of the audience
identify the need for consistency of presentation, in terms of styles, point
sizes, colour schemes, transitions and animations
use the master slide to place objects appropriately, including: images, text,
logos, slide footers, automated slide numbering
use the master slide to set font styles, heading styles and colour schemes,
as required by the audience
manipulate and use specified areas for headings, subheadings, bullets,
images, charts, colours, text boxes, presenter notes, audience notes, as
appropriate
Use suitable software tools to create presentation slides to meet the needs of the
audience
insert a new slide, when required, selecting the appropriate slide type for
the purpose
place text on the slides including: headings, subheadings, bulleted lists,
where appropriate
apply consistent styles using available software tools, including: select from
the presentation colour scheme, the use of text enhancement
place appropriate images on the slides, including: still images, video clips,
animated images
place sound within a slide
place charts imported from a spreadsheet
place other objects including: symbols, lines, arrows, call out boxes
create consistent transitions between pages
create consistent animation facilities on text, images and other objects
Use suitable software tools to display the presentation in a variety of formats,
including: looped on-screen carousel, controlled presentation, presenter notes,
audience notes, taking into account the needs of the audience
Data analysis Create a data model
create and edit a data model
define the terms: cells, rows, columns, sheets, tabs, pages, charts
explain the importance of accurate data entry in spreadsheets
enter data with 100 per cent accuracy
edit the structure of an existing model, including: inserting cells, deleting
cells, inserting rows, deleting rows, inserting columns, deleting columns
define the terms: formula, function, absolute reference, relative reference,
ranges, named cell, named range, nested formulae/functions
explain the difference between a formula and a function
explain the order in which mathematical operations are performed and use
brackets to make sure that formulae work
use mathematical operators, including: add, subtract, multiply, divide,
indices, where necessary
explain the function of, and use, absolute and relative referencing, as
appropriate, when formulae are to be replicated
use absolute and relative references, named cells, named ranges and nested
formulae, as appropriate
use functions, including: sum, average, maximum, minimum, integer,
rounding, counting, LOOKUP, VLOOKUP, HLOOKUP, IF and nested functions,
when necessary
Test the data model
devise suitable test plans and test the data to demonstrate that the model
works
define the terms: testing, test data, expected outcome, actual outcome,
normal data, abnormal data, extreme data, what-if
explain the need to test a model before it is used
select appropriate test data to thoroughly test a data model
justify the choice of test data
calculate the expected outcomes before testing the model
test the model, correcting errors and re-testing, where appropriate
test the model by the use of what-ifs
Manipulate data
use search tools in spreadsheet software to select subsets of data
search using a single criterion and using multiple criteria, where
appropriate, with a variety of operators such as: AND, OR, NOT, LIKE, >, <, =,
>=, <=
search, where appropriate, using wildcards
sort data using a single criterion and using multiple criteria into ascending or
descending order, as required
Present data
use software tools to adjust the display features in a spreadsheet
adjust row height, column width and cell sizes so that all data, labels, and
formulae are fully visible
wrap text within cells so that all data are fully visible
hide and display rows and columns, where appropriate
use features to enhance a spreadsheet, including: text colour, cell colour,
bold, underline, italic and shading to meet the needs of the audience
format numeric data to display the number of decimal places, a variety of
different currency values, percentages, as appropriate
set the spreadsheet to display formulae and values
set the page orientation to portrait or landscape, as necessary
set the page layout so that it prints on a specified number of pages
use conditional formatting appropriately to change display format
depending upon the contents of a cell
Website Web development layers
authoring
identify and describe the three web development layers
understand the function of: content layer to enter the content and create
the structure of a web page; presentation layer to display and format
elements within a web page; behaviour layer to enter scripting language to
elements within a web page
Create a web page
use software tools to create the content layer of a web page to meet the
needs of the audience
explain the purpose of the head and body sections of a web page
place appropriate elements in the head section of a web page, including:
page title, attached stylesheets
place appropriate elements in the body section of a web page
explain why tables are used to structure elements within a web page
insert a table, including: table header, table rows, table data
use appropriate table attributes, including: to adjust cells to span more than
one row/column, to set table and cell sizes in terms of pixels and/or %
values, to apply styles to tables, to meet the needs of the audience
use software tools to appropriately place the content in a web page
insert appropriate objects into a web page including: text, still images,
moving images, sound clips
apply styles to text within a web page
apply styles to a list, including: ordered list, unordered list
insert an appropriate image into a web page
use appropriate image attributes, including: to adjust its size, aspect ratio
and alternate text
use software tools to create navigation within a web page and between web
pages
describe the function of a hyperlink
describe the concept of a bookmark and methods of creating a bookmark
within a web page
describe the function of an anchor and why it is rarely seen from the
browser view
define and understand the terms relative file path and absolute file path
explain why absolute file paths must not be used for hyperlinks to locally
saved web pages/objects
use an object’s id attribute to create a bookmark within a web page
create an anchor within a web page
create hyperlinks from: text, images
create hyperlinks, where appropriate, to: bookmarks on the same page,
other locally stored web pages, a website using the URL, send mail to a
specified email address, open in a specified location including: the same
window, a new window, with a window named as specified
Use stylesheets
use software tools to create the presentation layer of a web page
explain what is meant by the term cascading stylesheets
explain the difference between attached stylesheets and inline style
attributes
explain the hierarchy of multiple attached stylesheets and inline styles
within a web page
explain the difference between a style and a class
create generic external styles and inline style attributes, including:
background properties (e.g. colour, images), font properties (e.g. style,
typeface), table properties (e.g. background colour, horizontal and vertical
alignment, spacing, padding, borders: including collapsed, border thickness,
visible/invisible)
create external styles to be tagged in a web page including: h1, h2, h3, p, li,
as required
specify the font appearance for each style, including features such as: font
family, size, colour, alignment, bold and italic
save styles in cascading stylesheet format
explain why relative file paths must be used for attached stylesheets
attach an external stylesheet to a web page using a relative file path
attach comments to an external stylesheet
Test and publish a website
know how to publish a website
explain how to upload and publish the content of a website using ftp
test that web page elements work
test navigation within/from a web page using a test plan
test a website
create a test plan to test a website including: web page elements are visible,
navigation within/from a web page
justify the choice of test plan