GCSE ICT - Revision Check List

GCSE ICT - Revision Check List

GCSE ICT - Revision Check List

This topic may appear on both Unit 1 & 3 exam. Chapters 1 & 14 / Data, Information and Quality of Data / Insecure / Secure
The difference between data, information and knowledge
The meaning of Garbage In Garbage Out (GIGO)
Quality of data (is it fit for purpose? Accurate? Up to date? Valid? Non-biased?)
Data Validation (What is it?)
-Range Check
-Presence Check
-Format Check
-Check Digit Check
-Batch and Hash Total
Data Verification (What is it?)
-Visual Check
-Double Keying
-Parity Check
Encoding Data
Unit 1 – Chapter 11 / Desktop Publishing / Insecure / Secure
WYSIWYG – What you see is what you get meaning
Planning a document (layout, fonts to use, alignment, tabulation, headers and footers)
Layout – portrait and landscape
Fonts – san serif and serif
Alignment/justification – left centre right and justified
Tabs
Tables, Borders, Graphics, Watermarks
Unit 3 – Chapter 20 / Networks / Insecure / Secure
Advantages and Disadvantages of Networking
Peer-to-peer network / client-server network
Local Area Network and Wide Area Network
Bus, Star and Ring Networks
Internets, intranets and etranets
Network Security (passwords, access rights, encryption, backups, firewalls, virus protection)
Cable, Wireless, Satellite, Bluetooth
Packet Switching
Network Components: Switch, Network Interface Card, Gateway, Router, Bridge
Barcodes, Optical Mark Recognition (OMR) and Optical Character Recognition (OCR)
Portable data entry: This is like carrying around a bar code reader in a store and scanning as you go. At the till your bill is ready. Tesco use it!
Unit 1 - Chapter3 / Home and Personal Communication Systems / Insecure / Secure
Internet Hardware and Software (router, modem, ISP, Browser)
Dial-up and Broadband (differences)
Cable over Wireless (general awareness of interference, strength, speed etc)
Satellites (for connection in rural areas)
Mobile Communications (mobile phones, wireless laptop, dongle, Bluetooth)
Geographical Information Systems (use in tablets, phones etc – GIS is location technology such as Google Earth, SatNavs and Location Settings on Smart Phones. You can see Ariel views of locations and find out where someone is, or get directions to a certain place.)
Unit 1 - Chapter9 / E-mail / Insecure / Secure
Meaning of Inbox, Outbox, Sent, Deleted Items, Address Book
CC & BCC
Advantages and Disadvantages of E-Mail
Webmail (google mail – can access e-mails on any computer)
Security (viruses, spam, cyber bullying and phishing (someone trying to fake an email so you end them your details i.e bank details)
Unit 1 – Chapter 2 / Home Entertainment / Insecure / Secure
General Input and Output Devices
Unit 3 – Chapter 19 / Animation / Insecure / Secure
Frames & Key Frames
Persistence of vision
Tweening
Rotoscoping
Stop-motion animation, Claymation, pixilation
Bitmap and Vector issues in animation
Storyboarding and Moodboarding
Unit 1 - Chapter6 / ICT and Learning / Insecure / Secure
Input Devices (mouse, touchpad, tracker ball, joystick)
Devices to support learners with disabilities (voice recognition software (input device microphone), text-to-voice, braille keyboards, touch-sensitive devices)