Word processing

DEADLINE – FRI – 09/02/2018


Task 1

You need to download this letter and alter it so that it is more professional.

You should keep a record of all changes in the write-up guide here:

Task 2

You have been asked to evaluate these three posters and recommend one for the school to use.

You should use the following criteria sheet to help you structure your answers.

Task 3

You have been asked to use a poster template and some information to create an E-Safety poster.

You can download the task here: 

Follow the instructions to complete the task. It should look something similar to this when you are done:

What you have to do:

1. Enter and combine text and other information accurately within word processing documents

1.1 I can identify what types of information are needed in documents.

1.2 I can use appropriate techniques to enter text and other information accurately and efficiently.

1.3 I can select and use appropriate templates for different purposes.

1.4 I can identify when and how to combine and merge information from other software or other documents.

1.5 I can select and use a range of editing tools to amend document content.

1.6 I can combine or merge information within a document from a range of sources.

1.7 I can store and retrieve document and template files effectively, in line with local guidelines and conventions where available.

2. Create and modify layout and structures for word processing documents

2.1 I can identify the document requirements for structure and style.

2.2 I can identify what templates and styles are available and when to use them.

2.3 I can create and modify columns, tables and forms to organise information.

2.4 I can select and apply styles to text.

3. Use word processing software tools to format and present documents effectively to meet requirements

3.1 I can identify how the document should be formatted to aid meaning.

3.2 I can select and use appropriate techniques to format characters and paragraphs.

3.3 I can select and use appropriate page and section layouts to present and print documents.

3.4 I can describe any quality problems with documents.

3.5 I can check documents meet needs, using IT tools and making corrections as necessary.

3.6 I can respond appropriately to quality problems with documents so that outcomes meet needs.

 

 

ICT provides lots of fun, interesting and even educational opportunities! However, you need to agree to use it responsibly. This is a short summary of the AUP that you are agreeing to, but it is important that you find time to read the whole document (which can be found on the school website or by clicking on this link) to ensure you fully understand what is expected of you.

If you break any of the conditions outlined below you can lose some or all of you ICT access in school. Serious breach of the conditions can also result in exclusion.

You are responsible for keeping your own account safe by keeping your password secret and always remembering to log-off when you leave a machine.

You must not:

  • Attempt to login to another person’s account
  • Do anything that risks the network security e.g. uploading or downloading software or viruses
  • Take, manipulate, upload or post online images of students, staff, or parents/carers of students at Abbeywood Community School without first getting their permission
  • Make any negative or inappropriate comments about students, staff, or parents/carers of students at Abbeywood Community School online
  • Give out personal information about yourself or others online
  • Attempt to access material that is obscene, abusive or illegal
  • Attempt to bypass the filter system by using proxy bypass services or websites
  • Misuse the email or Frog messaging facilities
  • Use other people’s images and text in your work without acknowledging the source
  • Use your own device or school ICT facilities in class without the permission of you teacher
  • Use your own device or school ICT facilities out of class without permission from an appropriate member of staff
  • Print without permission from an appropriate adult.

Spec:

This is the ability to protect hardware, software and the data within an IT system against theft, malfunction and unauthorised access. The candidate will be able to identify day-to-day security risks and key laws and guidelines that affect the use of IT. They will use simple methods to protect software and personal data (e.g. risks from people getting access to data who are not authorised). They will identify the risk from viruses or from hardware not working properly and take simple steps to remedy the  situation.

1.1 I can describe the security issues that may threaten system performance.

1.2 I can apply a range of security precautions to protect IT systems and data.

1.3 I can describe the threats to system and information security and integrity.

1.4 I can keep information secure and manage personal access to information sources securely.

1.5 I can describe ways to protect hardware, software and data and minimise security risk.

1.6 I can apply guidelines and procedures for the secure use of IT.

1.7 I can describe why it is important to backup data and how to do so securely.

1.8 I can select and use effective backup procedures for systems and data.