Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)
Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents.
I'd like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write.
If you have any queries, feedback, or anything else. Feel free to send me a message and I'll reply as soon as possible!
- 15
- 0
- 1
Community
- Followers
- Following
65 Reviews received
16 items
P3 - Explain the security risks and protection mechanisms involved in website performance
Security: risks e.g. hacking, viruses, identity theft
Security protection mechanisms: firewalls; Secure Socket Layers (SSL); adherence to standards e.g. strong passwords p3
- Essay
- • 2 pages •
Security: risks e.g. hacking, viruses, identity theft
Security protection mechanisms: firewalls; Secure Socket Layers (SSL); adherence to standards e.g. strong passwords p3
P2 - Explain how different types of graphic images relate to file formats
Create the file formats section of your report, explaining how different types of graphic images relate to file formats. This should include sections explaining differences between vector and raster images with some examples of file formats that can be used to save them to storage medium.
- Essay
- • 2 pages •
Create the file formats section of your report, explaining how different types of graphic images relate to file formats. This should include sections explaining differences between vector and raster images with some examples of file formats that can be used to save them to storage medium.
P1 - Describe the hardware and software used to create and edit graphic images
The Hardware section needs to focus on components such as the graphics card and how their features impact upon graphical work
The software section needs to identify the vector and raster software applications you would wish to use as well as other software.
- Essay
- • 2 pages •
The Hardware section needs to focus on components such as the graphics card and how their features impact upon graphical work
The software section needs to identify the vector and raster software applications you would wish to use as well as other software.
P1 - Illustrate typical phases of a project life cycle
Illustrate the typical phases of a project lifecycle
Use a diagram to illustrate the typical phases of a project lifecycle. Annotate the diagram with an explanation of each phase/stage. At a minimum your diagram must include the following phases (you may however add more as long as they are valid phases/stages of a project’s lifecycle):
•	defining and producing specification
•	planning and designing
•	collecting information
•	implementing
•	completing and reviewing
- Essay
- • 1 pages •
Illustrate the typical phases of a project lifecycle
Use a diagram to illustrate the typical phases of a project lifecycle. Annotate the diagram with an explanation of each phase/stage. At a minimum your diagram must include the following phases (you may however add more as long as they are valid phases/stages of a project’s lifecycle):
•	defining and producing specification
•	planning and designing
•	collecting information
•	implementing
•	completing and reviewing
P2 - Explain the impact of organisational policies and procedures on the provision of technical support
Report on the Working procedures and policies: 

•	Organisational guidelines (choose at least one of the following) eg 
•	reporting of faults . internet use . security

•	You must include:
•	service level agreements . confidentiality . sensitivity of information

•	Grading tips: Include the impact of organisational constraints as well as policies and procedures e.g. 
•	Costs of resources required
•	Time
•	User expertise
- Essay
- • 2 pages •
Report on the Working procedures and policies: 

•	Organisational guidelines (choose at least one of the following) eg 
•	reporting of faults . internet use . security

•	You must include:
•	service level agreements . confidentiality . sensitivity of information

•	Grading tips: Include the impact of organisational constraints as well as policies and procedures e.g. 
•	Costs of resources required
•	Time
•	User expertise
M1 - Compare the benefits and disadvantages of peer-to-peer network and client networks
One of CIT’s board members heard of peer-to-peer networks and believes that it would have been considerably less expensive to install and configure. Create a comparison table weighing the advantages against the disadvantages of peer-to-peer and client/server networks. 
In your Comparison table use the following comparison Headings:
•	Cost
•	Management/administration/support
•	Sharing Resources
•	Security
•	Size of network/ Scalability
- Judgments
- • 2 pages •
One of CIT’s board members heard of peer-to-peer networks and believes that it would have been considerably less expensive to install and configure. Create a comparison table weighing the advantages against the disadvantages of peer-to-peer and client/server networks. 
In your Comparison table use the following comparison Headings:
•	Cost
•	Management/administration/support
•	Sharing Resources
•	Security
•	Size of network/ Scalability
M1 - Recommend methods to promote an e-commerce system
Write a summary report setting out the pros and cons of each potential method of promotion listed below (a table could be used). Recommend methods for Cuckoo’s clocks and watches products business in a priority order. 
Promotional Method	Benefit	Drawback	Recommendation (Cuckoo’s clocks and watches)
			

Grading tip 
Discuss all types of promotion and, when recommending for Cuckoo, take into account the type of customers they are trying to attract.
Promotion: effective use of search engines e...
- Essay
- • 2 pages •
Write a summary report setting out the pros and cons of each potential method of promotion listed below (a table could be used). Recommend methods for Cuckoo’s clocks and watches products business in a priority order. 
Promotional Method	Benefit	Drawback	Recommendation (Cuckoo’s clocks and watches)
			

Grading tip 
Discuss all types of promotion and, when recommending for Cuckoo, take into account the type of customers they are trying to attract.
Promotion: effective use of search engines e...
P4 - Review the regulations governing e-commerce
Produce a short booklet from the customer’s point of view focussing on the effects of e-commerce. Use the title ‘Shopping and handling Money Online’. The purpose of this booklet is to give the reader a balanced view of e-commerce so they can be more informed when deciding if they will shop online. This booklet could be made available in public places, such as libraries and shopping centres.

A.	Describe each of the major pieces of legislation to which all e-commerce businesses must adhere....
- Essay
- • 3 pages •
Produce a short booklet from the customer’s point of view focussing on the effects of e-commerce. Use the title ‘Shopping and handling Money Online’. The purpose of this booklet is to give the reader a balanced view of e-commerce so they can be more informed when deciding if they will shop online. This booklet could be made available in public places, such as libraries and shopping centres.

A.	Describe each of the major pieces of legislation to which all e-commerce businesses must adhere....
P1 & M1 - Explain the impact of different types of threat on an organisation and discuss information security
Task 1: Create a leaflet which explains the following threats on organisation:

1.	Potential threats: 
i.	malicious damage;
ii.	Threats related to e-commerce; 
iii.	Counterfeit goods; 
iv.	Technical failures eg human error, theft of equipment

2.	Malicious damage: 
i.	Access causing damage eg viruses; 
ii.	access without damage; 
iii.	phishing, 
iv.	identity theft, 
v.	piggybacking, 
vi.	hacking

3.	Threats related to e-commerce: 
i.	website defacement; 
ii.	control of access to data via third p...
- Essay
- • 7 pages •
Task 1: Create a leaflet which explains the following threats on organisation:

1.	Potential threats: 
i.	malicious damage;
ii.	Threats related to e-commerce; 
iii.	Counterfeit goods; 
iv.	Technical failures eg human error, theft of equipment

2.	Malicious damage: 
i.	Access causing damage eg viruses; 
ii.	access without damage; 
iii.	phishing, 
iv.	identity theft, 
v.	piggybacking, 
vi.	hacking

3.	Threats related to e-commerce: 
i.	website defacement; 
ii.	control of access to data via third p...
P4 - Explain how an organisation can manage risk when using IT technology
Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided.

•	Cyber crime
•	Diverting financial assets
•	Sabotage of communications
•	Intellectual property theft
•	Denial of service attacks
•	Preventive technologies
•	Secure payment systems
•	Disaster recovery

- Essay
- • 5 pages •
Explain how an organization can manage risk when using IT technology. To achieve this expand on the following headings, using the on-line resources provided.

•	Cyber crime
•	Diverting financial assets
•	Sabotage of communications
•	Intellectual property theft
•	Denial of service attacks
•	Preventive technologies
•	Secure payment systems
•	Disaster recovery

P2 & D1 - Explain and evaluate the impact of IT developments on an organisation
M1 - Compare the features and functions of different operating systems
Not what I needed
P4 - Explain how an organisation can manage risk when using IT technology
D1 - Discuss different ways of recovering from a disaster
D1 - Evaluate the impact of evolving output mediums on the design and creation of graphic images