07.06.2013 Views

Level 2 and 3 Diploma in Business Support (4475-12/13)

Level 2 and 3 Diploma in Business Support (4475-12/13)

Level 2 and 3 Diploma in Business Support (4475-12/13)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Outcome 4 Be able to use browser software to communicate <strong>in</strong>formation<br />

onl<strong>in</strong>e<br />

The learner should be able to <strong>and</strong> underst<strong>and</strong>:<br />

• Communicate <strong>in</strong>formation:<br />

• saved <strong>in</strong>formation (pod-casts, text, images), real time <strong>in</strong>formation (blogs, <strong>in</strong>stant messag<strong>in</strong>g)<br />

• Share <strong>in</strong>formation sources:<br />

• send l<strong>in</strong>k, send webpage<br />

• Submit <strong>in</strong>formation:<br />

• fill-<strong>in</strong> <strong>and</strong> submit web forms<br />

• rat<strong>in</strong>gs, reviews, recommendations<br />

• wikis<br />

• discussion forums, <strong>in</strong>teractive sites<br />

• netiquette<br />

Outcome 5 Be able to follow <strong>and</strong> underst<strong>and</strong> the need for safety <strong>and</strong><br />

security practices when work<strong>in</strong>g onl<strong>in</strong>e<br />

The learner should be able to <strong>and</strong> underst<strong>and</strong>:<br />

• Safety precautions:<br />

• firewall sett<strong>in</strong>gs, Internet security sett<strong>in</strong>gs<br />

• report <strong>in</strong>appropriate behaviour<br />

• report security threats or breaches<br />

• netiquette, content filter<strong>in</strong>g, avoid <strong>in</strong>appropriate disclosure of <strong>in</strong>formation<br />

• Threats to user safety:<br />

• abusive behaviour (‘cyber bully<strong>in</strong>g’), <strong>in</strong>appropriate behaviour <strong>and</strong> groom<strong>in</strong>g<br />

• abuse of young people<br />

• false identities<br />

• f<strong>in</strong>ancial deception<br />

• identity theft<br />

• Information security:<br />

• username <strong>and</strong> password/PIN selection, onl<strong>in</strong>e identity/profile<br />

• real name, pseudonym, avatar<br />

• what personal <strong>in</strong>formation to <strong>in</strong>clude, who can see the <strong>in</strong>formation, withhold personal<br />

<strong>in</strong>formation<br />

• M<strong>in</strong>imise risk:<br />

• virus-check<strong>in</strong>g software, anti-spam software, firewall<br />

• treat messages, files, software <strong>and</strong> attachments from unknown sources with caution<br />

• Laws, guidel<strong>in</strong>es <strong>and</strong> procedures:<br />

• set by employer or organisation or centre relat<strong>in</strong>g to health <strong>and</strong> safety, security<br />

Laws: relat<strong>in</strong>g to copyright, software download <strong>and</strong> licens<strong>in</strong>g<br />

<strong>Level</strong> 2 <strong>and</strong> 3 <strong>Diploma</strong> <strong>in</strong> Bus<strong>in</strong>ess <strong>Support</strong> (<strong>4475</strong>-<strong>12</strong>/<strong>13</strong>) 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!