Level 2 and 3 Diploma in Business Support (4475-12/13)
Level 2 and 3 Diploma in Business Support (4475-12/13)
Level 2 and 3 Diploma in Business Support (4475-12/13)
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Outcome 4 Be able to use browser software to communicate <strong>in</strong>formation<br />
onl<strong>in</strong>e<br />
The learner should be able to <strong>and</strong> underst<strong>and</strong>:<br />
• Communicate <strong>in</strong>formation:<br />
• saved <strong>in</strong>formation (pod-casts, text, images), real time <strong>in</strong>formation (blogs, <strong>in</strong>stant messag<strong>in</strong>g)<br />
• Share <strong>in</strong>formation sources:<br />
• send l<strong>in</strong>k, send webpage<br />
• Submit <strong>in</strong>formation:<br />
• fill-<strong>in</strong> <strong>and</strong> submit web forms<br />
• rat<strong>in</strong>gs, reviews, recommendations<br />
• wikis<br />
• discussion forums, <strong>in</strong>teractive sites<br />
• netiquette<br />
Outcome 5 Be able to follow <strong>and</strong> underst<strong>and</strong> the need for safety <strong>and</strong><br />
security practices when work<strong>in</strong>g onl<strong>in</strong>e<br />
The learner should be able to <strong>and</strong> underst<strong>and</strong>:<br />
• Safety precautions:<br />
• firewall sett<strong>in</strong>gs, Internet security sett<strong>in</strong>gs<br />
• report <strong>in</strong>appropriate behaviour<br />
• report security threats or breaches<br />
• netiquette, content filter<strong>in</strong>g, avoid <strong>in</strong>appropriate disclosure of <strong>in</strong>formation<br />
• Threats to user safety:<br />
• abusive behaviour (‘cyber bully<strong>in</strong>g’), <strong>in</strong>appropriate behaviour <strong>and</strong> groom<strong>in</strong>g<br />
• abuse of young people<br />
• false identities<br />
• f<strong>in</strong>ancial deception<br />
• identity theft<br />
• Information security:<br />
• username <strong>and</strong> password/PIN selection, onl<strong>in</strong>e identity/profile<br />
• real name, pseudonym, avatar<br />
• what personal <strong>in</strong>formation to <strong>in</strong>clude, who can see the <strong>in</strong>formation, withhold personal<br />
<strong>in</strong>formation<br />
• M<strong>in</strong>imise risk:<br />
• virus-check<strong>in</strong>g software, anti-spam software, firewall<br />
• treat messages, files, software <strong>and</strong> attachments from unknown sources with caution<br />
• Laws, guidel<strong>in</strong>es <strong>and</strong> procedures:<br />
• set by employer or organisation or centre relat<strong>in</strong>g to health <strong>and</strong> safety, security<br />
Laws: relat<strong>in</strong>g to copyright, software download <strong>and</strong> licens<strong>in</strong>g<br />
<strong>Level</strong> 2 <strong>and</strong> 3 <strong>Diploma</strong> <strong>in</strong> Bus<strong>in</strong>ess <strong>Support</strong> (<strong>4475</strong>-<strong>12</strong>/<strong>13</strong>) 19