Bteccomputingandbusiness
On this page, you find all documents, package deals, and flashcards offered by seller BTECcomputingANDbusiness.
- 30
- 0
- 0
Community
- Followers
- Following
57 Reviews received
32 items
Learning Aim B | Unit 17 - Mobile Apps Development | BTEC Computing| 2020
B.P3
Produce designs for a mobile app to meet identified requirements.

B.P4
Review the mobile app designs with others to identify and inform refinements.

B.M2
Justify how decisions made during the design process ensure the design for the app will meet identified requirements.
- Package deal
- Summary
- • 20 pages •
B.P3
Produce designs for a mobile app to meet identified requirements.

B.P4
Review the mobile app designs with others to identify and inform refinements.

B.M2
Justify how decisions made during the design process ensure the design for the app will meet identified requirements.
Learning Aim C | Unit 17 - Mobile Apps Development | BTEC Computing| 2020
C.P5
Produce a mobile app that meets the design criteria.

C.P6
Test a mobile app for functionality, usability, stability and performance.

C.M3
Optimise a mobile app that meets the design criteria.

GRADE: Distinction
- Package deal
- Summary
- • 26 pages •
C.P5
Produce a mobile app that meets the design criteria.

C.P6
Test a mobile app for functionality, usability, stability and performance.

C.M3
Optimise a mobile app that meets the design criteria.

GRADE: Distinction
CD.D3 Demonstrate individual responsibility and effective selfmanagement in the planning and protection of an IT system. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
D.P8 Review the extent to which the organisation’s IT system has been protected. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
Learning Aim A | Unit 17 - Mobile Apps Development | BTEC Computing | 2020
A.M1 Assess the impact that IT security threats can have on organisations’ IT systems and business while taking account of the principles of information security and legal requirements. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
C.P5 Explain how protection techniques can help defend an organisation from security threats. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing