PART
PART 2
PART 3
PART 4
PART 5
100

State a key feature of a graphic design application

  • Filter Alplha bending Bleed. Quick Mask
100

State a type of data communication networks.

  • *Local Area Network (LAN) *Wide Area Network (WAN) *Metropolitan Area Network (MAN) *Wireless Network *Satellite Network
100

Name a common data networking device

  • Switch / Hub Router Firewall Wireless Access Point (WAP)
100

The ______________ uses ethernet cables or twisted pair cable and

Cable Technology

100
  • State a common concern with Cyber safety or security.
  • Hacking and cracking Computer Viruses Software Attacks Identity Theft
200
  • _______________uses radio waves microwaves. Ethernet cables are used to connect computers to switches or router while radio waves microwaves is used to maintain communication between devices.

Wireless

200
  • Outline the elements of good website design.
  • Color Scheme Consistent Theme Font Use Usability
200
  • Outline the elements of good graphic design.
  • Line Colour Shape Texture
200

Key components of an ICT /IT infrastructure

users ;  software ; hardware or network

200
  • Identify a type of digital media. 
  • digital media player, PC's, Smart Phones, Digital camera
300

State the purpose for an ICT/IT infrastructure.

  • Maintaining and managing company or organizational data and information
300
  • Define Cyber Security.
  • Cyber safety or security is about using technologies, processes and practices designed to protect data networks computers, programs and data from attack, damage or unauthorised access
300

major type of ICT security.

Computer security Physical Security Network/Internet Security

300

State the main function of specific digital media device (audio or video).

*Microphone - its an input device for recording audio or sound and can be saved using a Computer *Speaker - output sound from the computer *Digital Video Recorder is an electronic devide that records video in a digital format to a disk drive *Webcam - take stll images and records moving images videos

300
  • Justify the need for an organization to use open source or proprietary software.

Depending on the organisation budget and requirements

400

Concern with Cyber Security 

as Identity theft and Viruses and malwares

400
  • Outline the key features of a wireless access point.
  • scan for wireless devices in its range that connects to WAP and allow communication. *connects PC's, laptops, mobile to the internet *scan the network for wireless threats and attacks.
400
  • Outline the main types of ICT security systems.
  • Computer security is the protection of computing systems and the data that they store or access. Physical security is the protection of physical access to ICT hardware and devices
400
  • Explain the effect of application features that can be used on a specific media object.
  • These features such as Amplify and Animation effect strengthens low-power digital audio signals to a level that is strong enough for a loudspeaker or headphones and enable users with the ability to animate object and text
400
  • Outline the key features of a Network Interface Card (NIC).

provides the computer with a dedicated, full-time connection to a network. *installed in a computer so that it can be connected to a network

500

design requirements for a specific publication

Simple and easily readable and so as good contrast between title and 

background will enable audience to follow it easily

more friendly with its simple natures and the good contrast

500
  • Explain key graphic design requirements for a specific publication. (eg, Book cover)
  • This requirements such as Simple and easily readable and so as good contrast between title and background will enable audience to follow it easily as it is more friendly with its simple natures and the good contrast will capture the audience attention
500

key security measures to protect ICT users and their environment.

Proper access control such as using biometrics or using strong access passwords. Update anti-virus regularly to protect the system from any new viruses being made.

500
  • Explain the main concerns for users when downloading software from the internet. 
  • These concerns for malicious software (viruses and malware) and hackers and crackers will make users to experience the attack of malicous software injected by hackers and crackers that will take control of your computer and damage your important files and steal your identity
500
  • Define digital media.

digital media is about using Computer and internet technologies to produce And transmit digital output in different forms such as texts, graphics, audio, video and web content