[Year 12 IT Apps] U4O2

Christophersen, Paula P christophersen.paula.p at edumail.vic.gov.au
Mon Aug 8 08:44:40 EST 2011


Dear Joyce and colleagues

I would just like to clarify a point about the detailed examples in the Advice for teachers section. I would like to emphasise that they are not sample SACs - the detailed examples typically address part or most of an outcome, but they never cover all of the requirements. This is deliberate - we do not want publically available tasks for students for authentication purposes.

Regards
Paula

Paula Christophersen
ICT Curriculum Manager
Victorian Curriculum and Assessment
Authority
(03) 9651 4378

From: itapps-bounces at edulists.com.au [mailto:itapps-bounces at edulists.com.au] On Behalf Of Joyce Tabone
Sent: Monday, 8 August 2011 8:26 AM
To: Year 12 IT Applications Teachers' Mailing List
Subject: [Year 12 IT Apps] U4O2

Hi all

I am starting to plan for the Unit 4 Outcome 2 SAC and after reading the sample SAC on page 75 of the study design, I have become seriously confused.  Can someone please help out with the following:


1.       Question 2a asks to list the threats to the integrity and security of data and information, which I am assuming students will need to take from the case study. Question 3 then goes on to ask what are the ineffective information management strategies.  Can anyone give me an explanation of how this is different to question 2a?
(The way I see it , is it is the ineffective management strategies that open them up to the threats ...)


2.       Question 5, asks students to select six information management strategies and propose criteria that could be used to evaluate their effectiveness, then students are required to apply their criteria to evaluate the effectiveness.  I get the first part,  but how can students apply their criteria?



3.       Question 6 ask students to list four current practices used by the organisation to manage the storage, communication and disposal of data, how is this question different to question 1B, what are the information management strategies used by the organisation to store, communicate and dispose of data


If anyone can shed some light on these questions, that would be really helpful.

Thanks
Joyce


Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://www.edulists.com.au/pipermail/itapps/attachments/20110807/e575b5fb/attachment-0001.html 


More information about the itapps mailing list