Unit 1 - The Understanding of Digital Platforms and Open Standards
Overview
The candidate can understand how open standards help create and maintain open systems and how information and data is effectively managed, or mismanaged for illicit purposes. Candidates will investigate and report on their understanding of th range and type of digital materials that they deal with in their lives, including the capture and interpretation of this material. They will then demonstrate their skills and understanding of the nature of digital artifacts in order to control the outcomes of their use for different purposes and audiences. They will analyse the different aspects of digital artifacts and discuss the laws and regulations that serve to protect information online.
Assessor's guide to interpreting the criteria
General Information
RQF general description for Level 2 qualifications
- Achievement at RQF level 2 (EQF Level 3) reflects the ability to select and use relevant knowledge, ideas, skills and procedures to complete well-defined tasks and address straightforward problems. It includes taking responsibility for completing tasks and procedures and exercising autonomy and judgement subject to overall direction or guidance.
-
Use understanding of facts, procedures and ideas to complete well-defined tasks and address straightforward problems. Interpret relevant information and ideas. Be aware of the types of information that are relevant to the area of study or work.
-
Complete well-defined, generally routine tasks and address straightforward problems. Select and use relevant skills and procedures. Identify, gather and use relevant information to inform actions. Identify how effective actions have been.
-
Take responsibility for completing tasks and procedures subject to direction or guidance as needed.
Requirements
-
Standards must be confirmed by a trained Gold Level Assessor or higher.
-
Assessors must at a minimum record assessment judgements as entries in the on-line mark book on the INGOTs.org certification site.
-
The work in the unit is recommended in order for candidates to have covered enough depth and breadth in the topic to successfully carry out their controlled assessment and take the external exam.
-
When the candidate has covered as much of ths material as necessary to complete the controlled assessment element, they may be introduced to the topic
-
This unit should take an average level 2 learner 25 hours of work to complete.
Assessment Method
This unit will be assessed synoptically via a controlled assessment and also through an external examination.
Expansion of the assessment criteria
1. Understand the structure and properties of digital material
1.1 I can understand the nature of digital material
As they use their smartphone they will be sending out data about where they are.
the food chain they visited.
or gender being tracked.
1.2 I can describe different types of digital material
Learners need to show that they have investigated and understood a range of digital material in as many contexts as possible. There is
no set list here, but examples should include some or all of the following:
- Digitally stored documents
- Photographs
- Podcasts
- Blogs, Vlogs, Wikis
- Social media sites
- SMS (Short Message Service) and MMS (Multimedia
- Messaging Service) such as Whatsapp
1.3 I can demonstrate how different types of digital material are captured
Learners can investigate and report on some of the material that is captured as they go about their daily lives. This will include some of
the following examples:
- ANPR and Speed cameras on road networks,
- EPOS systems via barcodes or QR Codes in retail
- Mobile phone data as handsets are handed from mast to mast
- Satellite GPS data for use in SATNAV and other applications
- Sensors and Dataloggers in Aircraft nose-cones during international flights collecting weather data
- Satellite data in the form of IR UV and Visible images, for meteorology, mapping and surveillance.
Learners should be able to describe the advantages and disadvantages of automated v manual data capture
Learners should be able to discuss some ethical aspects of remote data capture presenting a cogent argument
1.4 I can demonstrate how digital material becomes information
Learners will be able to describe how a range of software apps take data, give it context and display it in a format that transforms it into
information. These will include:
- Document processing applications such as word processors, desk top publishers and numerical systems
- Presentation applications which enable data in multiple media formats to be combined
- Database applications (either flat or relational tables ) that perform by performing queries and calculations allow data to be modelled in different ways
- Websites
- Video and or imaging applications that take raw images or footage and edit them to add context or detail.
1.5 I can describe how digital material is used for specific purposes
the needs of a target audience.
2. Plan, design and use digital information in appropriate ways
2.1 I can understand how to use digital information for different purposes
- Communicate ideas to wider audiences
- Model and predict outcomes
- Provide proof in investigations
Learners should be able to gather some examples of different types of material and write some reflective comments on why it was made and what it is supposed to achieve. Some material will be to persuade users to purchase something. Some government
information might be to warn people about problems, such as a recent campaign to warn car drivers not to use their mobile phones
whilst driving.
The more examples they can gather and comment on, the more in depth their understanding will be.
2.2 I can describe how digital information can affect outcomes and use this information to plan
can be used.
For this a working knowledge of digital file types will be required. File types covered by this section could be presented as a table as
below:
Type | Proprietary | Open | Other | Comment |
---|---|---|---|---|
Word processing | .docx | .odt | .rtf, .epub | Used primarily for documents |
Numerical data | .xlsx | .ods | .csv | Used for numbers, but can have text |
Image files | .bmp | .svg | .png | Files have different properties based on use and purpose, i.e. .svg can be scaled to large posters and keep quality |
There are extensive file types and the above is only an example.
Other files to explore could include:.pdf, .txt, .pptx, .htm, .html, .jpg, .gif, .wav, .mpv, .mp4, .mov, .wmf, .mp3, .psd etc.
Learners will also be able to describe the advantages and disadvantages in saving information in proprietary versus open standard formats.
2.3 I can demonstrate digital information in a number of different applications
The applications learners will use will be determined by the coursework areas the centre chooses to cover but it is expected thatthey will cover the range detailed in section 1.4.
More able students will describe that certain proprietary file formats contain more than is required for the formatting of that file (metadata) and that this can affect the way that this data can be moved between applications
2.4 I can describe the way digital information is designed to be used in different situations
Examples could be:
- Choosing to create artwork for a logo as an .svg as opposed to a .png
- Saving photographs that have been manipulated as a .psd as opposed to a .jpg
- Converting a spreadsheet of names and logins to .csv so that it can be imported into a web based database for logins to a Learning Management System.
2.5 I can demonstrate the relationship between digital information I create and how it is used
3. Analyse and evaluate the control of digital material
3.1 I can evaluate the need for control of the use of digital information
- Having reliable – regularly updated - antivirus systems on their devices
- Ensuring their PC systems are behind a firewall
- The use of strong passwords and non-reliance on a single password
- Setting online profile privacy levels
- Non-sharing of personal details and passwords
- Being aware of CEOP and other reporting mechanisms in the case of suspected abuse
3.2 I can describe the misuse of digital information
Students should be aware of any misuse and be able to describe accurately risks including:
- Phishing and pharming
- Trolling and Cyberbullying
- Hacking - including interception of mobile phone communications
- Misuse of social media for grooming and or sexting
3.3 I can discuss the laws that apply to digital information
These constraints may be local agreements such as the school / college Acceptable Use Policy (AUP), national or international
legislation. Learners will be expected to be able to discuss:
- Acceptable use policies
- Copyright constraints
- Investigatory Powers Bill
- Computer Misuse Act
- Data Protection Act and new (May 2018) General Data Protection Regulation
- Communication Act
3.4 I can discuss and describe the open standards that apply to digital information
Learners should be able to Identify key image file formats:
- svg, jpg and png as open standards associated with web browsers.
- CSS, HTML, XML, SQL, RSS and HTTP as open standards used in the production of websites
Learners should be able to discuss the difference between formats which are issued under the creative commons license framework
and those which are unlicensed.
Learners should also be able to discuss reasons behind the continual evolution of open licenses such as the development of HTML5 so that multimedia information can be embedded in websites without reliance on proprietary file formats such as “flash player”which is licensed by Adobe and has been shown to increase website vulnerabilities.
3.5 I can describe and evaluate my own digital material in terms of laws and standards
personal circumstance having carefully evaluated the risks created by their own online presence.