Wednesday, March 7th

 

 

 

Remember the report is worth more than the project so spend your time proofing each criterion, checking the notes for each criterion and looking at the sample provided.
Once you have finalized each section of your report save it as a PDF file.

At this point your project should be complete! It is now time to proof your product and have your client evaluate it (Criterion F). You must have written documentation that the client reviewed the product and their response.

How to Package your Documentation and Product - what to submit and how to package it.

When you are finished with your IA label your folder - LastName_ITGS_IA. Then move the folder to two different computers and test the cover page to be sure everything still works. Once everything is complete copy the folder to the ITGS submissions folder. Your folder should contain the following:
____________ Cover Page that links to each criterion and project (tested on different machines)
____________ Documentation folder with your report Criterion A-G
____________ Project folder that contains your entire project
____________ Screencast of your project

Once you have submitted the folder check with me to confirm that is has been submitted correctly.
Congratulations!

Use Screencastify or Screencast O Matic to record the screencast of your product (not the report, this is a visual tour of your product)
If you made a video as your product then your screencast will be of the software you used and how you performed your editing tasks with this software.

You must also include a screencast of your product.

Screencast Blog Page

Continue working on Criterion F - you may want to create a questionnaire for your client based on the initial specs of your project and have them complete it as part of their evaluation of the product. The evaluation of the completed product should refer directly to the specific performance criteria that form part of the requirements specifications in criterion B, as well as any other appropriate feedback obtained from the client at handover.

3. Question  - How can a screencast be made for a video?

Answer

There are two separate components here: a product and a screencast for the product. In the case you are describing, you have  two separate kinds of files: 

·         product: video made with Adobe Premiere, iMovie or similar application and a

·         screencast: online video capture using Jing, Camtasia, Quicktime Recorder or other screencasting software.

ALL projects require a screencast that

  • demonstrates the product functioning and
  • highlights the complex techniques that have been identified at the start of criterion E.

The screencast does not need to be edited and is not counted as an advanced technique. (reformated from the original statement in the Guidance on the appropriateness and complexity of an IT solution for the Project on page 1)

If the student has created a video, he will need to demonstrate that the video is functional and the complex techniques that he incorporated into the making of the video. For example, music may have been created in programs such as Garageband, some of the photos used in the video may have been edited in Photoshop, the sound in the video may use "ducking" whenever there is audio. The techniques justified in criteria E need to be shown in the screencast.

 

Homework

Continue work on finalizing your report. The report is worth more than the project so be sure to proof each criterion before saving them as a PDF file.
The project, report and screencast are Due Friday!

 

What

1.2 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access.
Security measures include restricted access to machines and networks for certain employees or to prevent
access by hackers. The degree of security of information systems largely determines society’s confidence in
the information contained in the systems.
1.3 Privacy and anonymity
Privacy is the ability of individuals and groups to determine for themselves when, how and to what extent
information about themselves is shared with others. At its extreme, privacy becomes anonymity when, for
instance, a person uses it to conceal his or her true identity in order to cyber-bully someone else. Conversely,
excessive privacy could also conceal the perpetrators of criminal, terrorist or computer hacking acts from
law enforcement agencies.

3.7 Databases
Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions. Databases enable organizations to maintain accurate and comprehensive records. In order to appreciate the role that databases play, the ITGS student must have an understanding of how they work, which can only be gained from the design and creation of basic relational databases as well as by examining how databases are used in specified scenarios (for instance, schools, retail stores, online shopping, online reservations). The increasing use of databases raises a range of social impacts and ethical issues such as the rights of individuals with respect to the storage and potential sale of their personal data or the ease of data mining
and data matching. Students are expected to discuss these issues and, where appropriate, evaluate possible solutions.

Possible scenario
A vet requires information about pet owners and their pets. The ITGS student must be able to develop an original IT solution to meet the vet’s needs. This knowledge should be acquired through a practical activity where the student creates a (minimum) three-table relational database (first normal form only) that uses queries to interrogate the data, forms to enable the easy input and viewing of data, and reports to provide printed information as required.
IT concepts to address in this topic
Database organization
• Table
• Field, data types, key field/primary key, secondary key
• Record
• Flat-file database, relational database, normalization
• Database management system
• Specialized databases: for example, web databases, online encyclopedias
Functions
• Data validation: data types, range check, check digit, field size, input mask, drop-down list
• Queries: for example, searching, sorting, filtering, use of Boolean operators (AND, NOT, OR)
• Data entry form
• Report generation
• Macros
• Transfer of data between databases and other applications
Data storage and access
• Data integrity, reliability, redundancy
• Data matching, data mining
• Database security
Practical database techniques
• Table
• Field, data types, key field/primary key, secondary key
• Record
• Linking tables to create a relational database
• Data maintenance: changing, editing, deleting records
• Queries: for example, searching, sorting, filtering, use of Boolean operators (AND, NOT, OR)
• Data entry form
• Report generation
• Creating and editing simple macros
• Mail merge

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions