DEADLINE – FRI – 09/02/2018
You need to download this letter and alter it so that it is more professional.
You should keep a record of all changes in the write-up guide here:
You have been asked to evaluate these three posters and recommend one for the school to use.
You should use the following criteria sheet to help you structure your answers.
You have been asked to use a poster template and some information to create an E-Safety poster.
You can download the task here:
Follow the instructions to complete the task. It should look something similar to this when you are done:
What you have to do:
1. Enter and combine text and other information accurately within word processing documents
2. Create and modify layout and structures for word processing documents
3. Use word processing software tools to format and present documents effectively to meet requirements
ICT provides lots of fun, interesting and even educational opportunities! However, you need to agree to use it responsibly. This is a short summary of the AUP that you are agreeing to, but it is important that you find time to read the whole document (which can be found on the school website or by clicking on this link) to ensure you fully understand what is expected of you.
If you break any of the conditions outlined below you can lose some or all of you ICT access in school. Serious breach of the conditions can also result in exclusion.
You are responsible for keeping your own account safe by keeping your password secret and always remembering to log-off when you leave a machine.
You must not:
- Attempt to login to another person’s account
- Do anything that risks the network security e.g. uploading or downloading software or viruses
- Take, manipulate, upload or post online images of students, staff, or parents/carers of students at Abbeywood Community School without first getting their permission
- Make any negative or inappropriate comments about students, staff, or parents/carers of students at Abbeywood Community School online
- Give out personal information about yourself or others online
- Attempt to access material that is obscene, abusive or illegal
- Attempt to bypass the filter system by using proxy bypass services or websites
- Misuse the email or Frog messaging facilities
- Use other people’s images and text in your work without acknowledging the source
- Use your own device or school ICT facilities in class without the permission of you teacher
- Use your own device or school ICT facilities out of class without permission from an appropriate member of staff
- Print without permission from an appropriate adult.
This is the ability to protect hardware, software and the data within an IT system against theft, malfunction and unauthorised access. The candidate will be able to identify day-to-day security risks and key laws and guidelines that affect the use of IT. They will use simple methods to protect software and personal data (e.g. risks from people getting access to data who are not authorised). They will identify the risk from viruses or from hardware not working properly and take simple steps to remedy the situation.