User:Beastathon
From Wikipedia, the free encyclopedia
]AIT 1A TASK 4: How to guide (70 marks) You have been asked by a number of different people to help them carry out procedures for maintaining and securing their home computers. You have decided to write a How to Guide that will explain the main procedures they will need to carry out and the resources they will need.
What you need to do 1. Maintenance and security tasks - List at least three headings that identify important topics relating to maintenance and security of home computer systems. Also include a list of any tasks that would be performed in each of the key areas. Do not write any procedures for tasks at this stage. [35 marks]
Insert this table and complete it (at least 3 topics) – a suggestion for topic 1 and the tasks has been completed for you. Maintenance and security topics [1 marks] Tasks [9 marks] Hardware or Software required [15 marks] Where will the resources be [10 marks] 1. Virus protection • install virus protection program • update virus protection program • scan computer • virus protection program • Computer shop • Internet 2. 2. You are now ready to prepare your How to Guide in Word. This will consist of procedures to carry out the tasks from your list. [25 marks] (a) Make good use of headings/subheadings and grouping related data. (b) Rank the tasks from most important to the least important. (c) For each task, make a list of the steps/procedures that would need to be carried out and the estimated time requirements. Be careful to make sure you have a logical sequence of steps to achieve the task. (d) Support your How to Guide with references to confirm that your procedures are based on standard practice. Your references could refer to books, web resources, notes and exercises from class and discussions with peers or teacher.
3. You also wish to make sure that these users (your clients) understand some of the issues associated with responsible and ethical use of their home computer. [10 marks] (a) Briefly describe: • software piracy • open source software. (b) Identify the impact on the community that results from the misuse of personal information in the areas of: • credit card numbers • email addresses.