logo-home

Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)

Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents.

I'd like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write.

If you have any queries, feedback, or anything else. Feel free to send me a message and I'll reply as soon as possible!

Community

  • Followers
  • Following

65 Reviews received

16 items

P3 - Explain the security risks and protection mechanisms involved in website performance

(0)
£2.99
0x  sold

Security: risks e.g. hacking, viruses, identity theft Security protection mechanisms: firewalls; Secure Socket Layers (SSL); adherence to standards e.g. strong passwords p3

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  19-06-2017
Quick View
i x

P2 - Explain how different types of graphic images relate to file formats

(0)
£2.99
1x  sold

Create the file formats section of your report, explaining how different types of graphic images relate to file formats. This should include sections explaining differences between vector and raster images with some examples of file formats that can be used to save them to storage medium.

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  15-06-2017
Quick View
i x

P1 - Describe the hardware and software used to create and edit graphic images

(0)
£2.99
3x  sold

The Hardware section needs to focus on components such as the graphics card and how their features impact upon graphical work The software section needs to identify the vector and raster software applications you would wish to use as well as other software.

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  15-06-2017
Quick View
i x

P1 - Illustrate typical phases of a project life cycle

(0)
£2.99
0x  sold

Illustrate the typical phases of a project lifecycle Use a diagram to illustrate the typical phases of a project lifecycle. Annotate the diagram with an explanation of each phase/stage. At a minimum your diagram must include the following phases (you may however add more as long as they are valid phases/stages of a project’s lifecycle): • defining and producing specification • planning and designing • collecting information • implementing • completing and reviewing

i x
  • Essay
  •  • 1 pages • 
  • by rapidhelp • 
  • uploaded  14-06-2017
Quick View
i x

P2 - Explain the impact of organisational policies and procedures on the provision of technical support

(2)
£3.10
3x  sold

Report on the Working procedures and policies: • Organisational guidelines (choose at least one of the following) eg • reporting of faults . internet use . security • You must include: • service level agreements . confidentiality . sensitivity of information • Grading tips: Include the impact of organisational constraints as well as policies and procedures e.g. • Costs of resources required • Time • User expertise

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  08-06-2017
Quick View
i x

M1 - Compare the benefits and disadvantages of peer-to-peer network and client networks

(0)
£3.10
0x  sold

One of CIT’s board members heard of peer-to-peer networks and believes that it would have been considerably less expensive to install and configure. Create a comparison table weighing the advantages against the disadvantages of peer-to-peer and client/server networks. In your Comparison table use the following comparison Headings: • Cost • Management/administration/support • Sharing Resources • Security • Size of network/ Scalability

i x
  • Judgments
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  07-06-2017
Quick View
i x

M1 - Recommend methods to promote an e-commerce system

(0)
£2.99
1x  sold

Write a summary report setting out the pros and cons of each potential method of promotion listed below (a table could be used). Recommend methods for Cuckoo’s clocks and watches products business in a priority order. Promotional Method Benefit Drawback Recommendation (Cuckoo’s clocks and watches) Grading tip Discuss all types of promotion and, when recommending for Cuckoo, take into account the type of customers they are trying to attract. Promotion: effective use of search engines e...

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  06-06-2017
Quick View
i x

P4 - Review the regulations governing e-commerce

(2)
£3.10
6x  sold

Produce a short booklet from the customer’s point of view focussing on the effects of e-commerce. Use the title ‘Shopping and handling Money Online’. The purpose of this booklet is to give the reader a balanced view of e-commerce so they can be more informed when deciding if they will shop online. This booklet could be made available in public places, such as libraries and shopping centres. A. Describe each of the major pieces of legislation to which all e-commerce businesses must adhere....

i x
  • Essay
  •  • 3 pages • 
  • by rapidhelp • 
  • uploaded  06-06-2017
Quick View
i x

P1 & M1 - Explain the impact of different types of threat on an organisation and discuss information security

(3)
£3.82
11x  sold

Task 1: Create a leaflet which explains the following threats on organisation: 1. Potential threats: i. malicious damage; ii. Threats related to e-commerce; iii. Counterfeit goods; iv. Technical failures eg human error, theft of equipment 2. Malicious damage: i. Access causing damage eg viruses; ii. access without damage; iii. phishing, iv. identity theft, v. piggybacking, vi. hacking 3. Threats related to e-commerce: i. website defacement; ii. control of access to data via third p...

i x
  • Essay
  •  • 7 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P4 - Explain how an organisation can manage risk when using IT technology

(2)
£3.10
12x  sold

Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided. • Cyber crime • Diverting financial assets • Sabotage of communications • Intellectual property theft • Denial of service attacks • Preventive technologies • Secure payment systems • Disaster recovery

i x
  • Essay
  •  • 5 pages • 
  • by rapidhelp • 
  • uploaded  30-05-2017
Quick View
i x