Categories
PAT Phase 1

Evaluating research sources for your PAT

Once you have composed the research questions in Phase 1 of your PAT you must find resources that contain information regarding each research question. These sources must be evaluated, the intention is that you ensure that your research is based on “quality” information. You are required to evaluate 3 of your sources – two website […]

Categories
CAT

The Windows Clipboard

The Windows Clipboard is a special location in memory that is used as a temporary storage area for any information that you copy or cut. Understanding how it works and how to use it can increase your productivity! You are most likely accustomed to copying (or cutting) and then pasting one item at a time, […]

Categories
PAT Phase 1

PAT Task Definition

The Task Definition is a written outline of the proposed project. It indicates an understanding of the task at hand, how the project will be carried out, what resources will be required, and how and to who the presentation will be made. The PAT Learner Guide explains: “To show that you understand why you are […]

Categories
PAT Phase 2

PAT Questionnaire

Phase 2 of your PAT requires you to create and execute a Questionnaire. Create a questionnaire as a one-page Word document. Your goal is to collect data that you will be able to analyse as required – most importantly: you need numeric data! Tip: if your name and surname & the name of your school […]

Categories
Theory

Ransomware

Garmin Connect users across the globe lost access to all their online fitness data as a result of a Ransomware attack just this month (August 2020). This form of cybercrime is a relatively new development. Read more about this attack on TechRepublic. The following information about ransomware is an extract from “Clarification of existing content […]

Categories
Theory

Types of computer crimes

There is a fairly long list of ways in which people commit cybercrimes (crimes committed using computer technology). Some are simply mildly irritating, while others range from financially disastrous to life-threatening. A number of the following cybercrimes are categorised under the heading “social engineering”, which is defined as: “The use of deception to manipulate or […]

Categories
Theory

File properties, attributes & metadata

File properties, attributes & metadata are three very similar concepts that can easily be confused. File properties are the basic info about a file, such as file name (1), file location (2) and file size (3). You cannot edit these file properties – they are reported on by the operating system and only change when […]