...CARIBBEAN EXAMINATIONS COUNCIL Caribbean Secondary Education Certificate CSEC ® INFORMATION TECHNOLOGY SYLLABUS Effective for examinations from May/June 2010 C XC 30/G /S YLL 08 1 Published by the Caribbean Examinations Council All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form, or by any means electronic, photocopying, recording or otherwise without prior permission of the author or publisher. Correspondence related to the syllabus should be addressed to: The Pro-Registrar Caribbean Examinations Council Caenwood Centre 37 Arnold Road, Kingston 5, Jamaica, W.I. Telephone: (876) 630-5200 Facsimile Number: (876) 967-4972 E-mail address: cxcwzo@cxc.org Website: www.cxc.org Copyright © 2008, by Caribbean Examinations Council The Garrison, St Michael BB14038, Barbados CXC 30/G/SYLL 08 Contents RATIONALE .............................................................................................................................................. AIMS ...................................................................................................................................................... 1 2 2 2 3 4 5 5 7 7 8 10 12 13 15 16 19 21 23 46 47 ORGANIZATION OF THE SYLLABUS .................................................................................................. SUGGESTED TIME-TABLE ALLOCATION .......................................................................................... FORMAT...
Words: 16882 - Pages: 68
...Questions 1-10 1. Information technology (IT) refers to the combination of hardware, software, and services that people use to manage, communicate, and share information. IT is important to businesses for reasons such as communicating with customers, efficiency of operations, security, and research capacity. 2. Business Profile: Is an overview of a company’s mission, functions, organization, products, services, customers, suppliers, competitors, constraints, and future direction. Business Process: Is a specific set of transactions, events, and results that can be described and documented. Business Process Model (BPM): Graphically displays one or more business processes, such as handling an airline reservation, filling a product order, or updating a customer account. 3. The main components of an information system are hardware, software, data/Information, processes/procedures, and people. Stakeholders are the people who have an interest in an information system. This includes the management group, the users (end users), and IT staff members. 4. A horizontal application is a basic software package system that can be adapted to common business processes for example inventory and payroll. A vertical application system is customized to meet the unique needs of a particular business, industry, or organization. 5. Companies use EDI to plan production, adjust inventory levels, or stock up on raw materials using data from another company’s information system. XML enables...
Words: 258 - Pages: 2
...credentials are offered. In the authentication action, the claimed identity of the user is confirmed. Following verification procedure is done; authorization is included in meaning of exactly what the user is capable of doing in the application. During all this procedure, the accounting procedure monitors the user activities. Much like in other security procedures, this technique is a sequence (Charndra & Calderor, 2005). If there is a break in one of the factors; the entire chain is likely to break apart. This attracts focus on the importance of verification system. The accounting as well as authorization is only likely after correct identification and verification of the users (Hiltgen et al., 2006). Effects of authentication for new information systems An application security has got the ability of trading off between the higher security level and much more functionality. For that reason after including more security to verification, the result is observed through decrease in the approval rate of users when enhancing the usability. As a result, it's very difficult to discover the most dependable system of verification which the users can approve. Users are always looking for latest features as well as applications whose interfaces will be simple to use. By the same token, these types of users convey concerns that the dangers continues to enhance. Additionally, the rules continue to push organizations as well as producers towards security of their clients’ secrecy. One...
Words: 570 - Pages: 3
...The Virus Event Mike Williams Dr. James Wilson Abstract The world’s most complex malware ever created, the Stuxnet virus which was designed and enforced by the U.S. and Israel against Iran a few years ago, may have ended up infecting the International Space Station according to leading security analyst Eugene Kaspersky head of IT security at Kaspersky Labs. The virus was designed to only attack specific software and specific hardware in a specific uranium enrichment plant at Natanz, Iran. Stuxnet, however, isn’t at all specific on the targets it infects – basically it’s all over the world. It’s been long thought that only a country or organization with vasts amounts of resources could develop a virus of Stuxnet’s complexity. Last year, the Obama administration stepped out and confirmed that indeed the virus was made as a joint-operation with Israel against Iran, to nobody’s surprise frankly. A leftover from the Bush administration, Stuxnet operations were accelerated during Obama’s presidency and eventually launched against Iran. How the virus works and propagated itself onto servers It primarily spreads via USB sticks, which allows it to get into computers and networks not normally connected to the Internet. Once inside a network, it uses a variety of mechanisms to propagate to other machines within that network and gain privilege once it has infected those machines. These mechanisms include both known and patched vulnerabilities, and four “zero-day exploits”:...
Words: 1413 - Pages: 6
...September 11, 2013 By Timothy Hale, U.S. Army Reserve Command Chief Warrant Officer 5 Phyllis J. Wilson, the U.S. Army Reserve command chief warrant officer, shared what she sees as the top five qualities: strong character, strong leadership skills, technical savvy, across the board competence, and the capacity to be a counselor, adviser and mentor. "We want some of the best NCOs to come into the Army warrant officer corps," Wilson said. "You've got to be extremely good at your skill set: being a strong leader and knowing your technical skills so you can advise -- the same things that the rest of the Army leadership talks about." She said the competence a warrant officer must have is not only the technical aspect of their MOS, but also tactical competence. "Character -- that's not exchangeable for anything else," Wilson said. The path to becoming a warrant officer is not unlike the enlisted or officer career track. Once recruited, warrant officer candidates attend the five-week Warrant Officer Candidate School, known as WOCS, at Fort Rucker, Ala. "It's a very vigorous course of training," Peak said. "The course is designed for the cadre to evaluate the candidates' skills, qualities, and traits to ensure they are commensurate to what the Army expects of a warrant officer one." He said that individual skills and leadership capabilities are tested along with transition training from being enlisted to officer. * Copyright © 2013 TheHuffingtonPost.com, Inc...
Words: 3105 - Pages: 13
...02/19/13 Version 2.0 Blackboard Tips Before logging into Blackboard, clear the computer’s Temporary Internet files and Cookies by completing these steps: It is important to complete all steps. NOTE: ELLC Blackboard will not work with Internet Explorer Version 7. Internet Explorer* (Version 8 or 9) 1. Open a browser window 2. Select Tools from the menu options 3. Select Internet Options 4. In the Browsing history section, click Delete 5. Uncheck Preserve Favorites website data (if checked) 6. Check Temporary Internet files and Cookies (if unchecked) 7. Click Delete 8. Click OK 9. Close the browser window 10. Open a new browser window and access Blackboard Following the steps outlined above will help with common problems such as seeing a “red banner” error across the top of the screen in Blackboard, or not being able to see the SMTC Home tab or SMTC Course Catalog. Students may use their AKO username and password or CAC to enroll in a course. Internet Explorer (Versions 8 and 9) works with both CACs do not work with Firefox To access Blackboard: Go to https://ssi.ellc.learn.army.mil Log in using your CAC or AKO username and password Select the Courses menu item at the top of the screen Click on SMTC Courses in the Course Catalog area o A list of available courses will display Click on the down arrow next to the Course ID for your course and select Enroll Enter the Access Code provided by the instructor, and click Submit o An Action Successful message...
Words: 434 - Pages: 2
...research is done Population all over the world can work together now, despite living far in states or even countries. Before the Internet, we use to do research in different ways by going to the library using books and encyclopedias. Now a day you can use the Internet for anything you want, from researching an article, buying clothes, food, music and movies, and is the reason there is Internet law that is created to protect customers, brands and companies. An Internet law is the Communications Decency Act (CDA) in 1996, correcting the information in the websites. The purpose of this was to keep children and minors away from pornography. It is required that more laws concerning the Internet will be created and pass in order to protect consumers, buyers, marketers and businesses from the negative effects of misconducts or cybercrimes. Congress has to modernize almost daily with technological changes. Communication technology and new information available today are challenging the intellectual property system in ways that may be resolved with substantial changes, in a system or with new mechanisms to allocate both rights and remedies. Technological change is now leaving behind the legal structure that governs the system and is creating pressure to Congress to adjust the law to accommodate these changes. Some of the concerns are: Authors, publishers, filmmakers, and producers; representatives of the recording industry whose work can be released on the internet. This group...
Words: 403 - Pages: 2
...Information Technology Acts J Lacy Parson BIS/220 4 Oct 2014 Lisa Paulson Information Technology Acts There were many different acts to choose from. Throughout the years so much as changed in terms of information technology, it seems that every year there are new issues. The most interesting to me were the No Electronic Theft (NET) Act, enacted in 1997 and the Federal Information Security Management Act of 2002. The No Electronic Theft Act protects copyright owners against infringement. According to Indiana University it makes copyrighted material “federal crime to reproduce, distribute, or share copies of electronic copyrighted works such as songs, movies, games, or software programs, even if the person copying or distributing the material acts without commercial purpose and/or receives no private financial gain.” (What is the No Electronic Theft Act 2014) This came from the progression that the internet made. The internet made is so easy to share information or download songs. It was a necessary act in my opinion. With blogs being such a big thing it also protected against someone claiming information as their own. The next very interesting act is the Federal Information Management Security Act of 2002. The act states that; “The Department of Homeland Security activities will include (but will not be limited to): overseeing the government-wide and agency-specific implementation of and reporting on cyber security policies and guidance; overseeing...
Words: 481 - Pages: 2
...are then distributed globally to computers connected to the internet to be completed by the Microtask’s workforce. By breaking these tasks into smaller, individual tasks, workers working on these tasks will not be able to identify information relating to the client or the larger task. The way how the company can have its microtasks to be completed in the shortest time is because Microtask supplies the workers everything needed to accomplish the task so they can focused on one screen without having to surf the internet to look for any other information. Not only is Microtask offering a software that breaks work into smaller tasks to be completed efficiently, CloudCrowd is offering the same thing. Microtask’s creation of this software might be the best innovation ever because it would really benefit any company who choose to use it. It will help increase companies’ efficiency a lot. Efficiency is what companies want because it is the key to improving their businesses and helping them prosper. Companies using this software can spend less time doing tedious and boring tasks because the software is developed to complete these tedious and boring tasks at a very fast rate for them. Compared to a regular worker doing tedious work like inserting information into the company’s database which will take a very long time to finish, the software can complete the task within seconds. It saves time in doing these kinds of work and the company can focus more on completing the more...
Words: 382 - Pages: 2
...limited amount of copyrighted material for educational or research purposes? Correct Response: Fair Use Question 4Question Code: ICT-COMMv1-02-04-01-01 Users scan Web pages searching for keywords or headings that interest them. What should the text and image content on your Web pages contain in order to capture the visitor's attention? Correct Response: Clear, understandable, complete and concise information Question 5Question Code: ICT-COMMv1-02-05-03-02 Which part of an e-mail address identifies the Internet Service Provider (ISP) through which you can access e-mail? Correct Response: The domain name Question 6Question Code: ICT-COMMv1-02-05-06-02 Which term describes an online contacts list that contains the names, phone numbers and e-mail addresses of the people to whom you want to send e-mail messages? Correct Response: Address book Question 7Question Code: ICT-COMMv1-02-03-04-03 Which of the following should you practice to help ensure that you do not become the victim of a spammer or a cyberbully? Correct Response: Avoid revealing too much personal information on social network sites. Question 8Question Code: ICT-COMMv1-02-03-03-01 Which of the following describes a form of cyberbullying? Correct Response: Sending hurtful messages, posting mean comments or gossiping about others online Question 9Question Code: ICT-COMMv1-02-03-02-01 When communicating on social networking sites, it is...
Words: 711 - Pages: 3
...Professional Organization: The Tech Republic By: Mike Vignapiano Foundations for General Education and Professional Success/GEN-200 18 February 2010 Prof. Jack Rivituso The professional organizations I am interested in (and belong to) are many. I am a member in ‘good standing’ with The Computing Technology Industry Association (CompTIA), Institute of Electrical and Electronics Engineers (IEEE), Network Professional Association (NPA), Independent Computer Consultants Association (ICCA). However, my favorite organization is Tech Republic Tech Republic is a free website dedicated to issues in the world of the Information Technology (IT). It is owned by CBS Interactive and marketed alongside BNet and ZDNet (formerly ZiffNet). Once a person becomes a registered member on this site, it will allow them to receive several e-newsletters, download certain ‘White Papers’ (authoritative report or guide that often addresses issues and how to solve them), and post comments on the site. Tech Republic provides up-to-date, relevant information for those people in the IT Field. Besides the White Papers, it also provides the member with Newsletters, Blogs, Downloads, Forums, Photos, Videos, Webcasts, Software, and Training. Most of these items are all free. However, there are some items that may need to be purchase (at reduced rates) and can do so at their...
Words: 617 - Pages: 3
...2 Search and explore the ITT Tech Virtual Library for resources on the Linux Filesystem. Use the following keywords and phrases to help you locate appropriate resources: ext file system Linux hierarchical file system Linux standards base Linux directory structure Unit 3 Search and explore the ITT Tech Virtual Library for resources on bash. Use the following keywords and phrases to help you locate appropriate resources: bash scripts bash history bourne shell bourne again shell commands in Linux Unit 4 Search and explore in the following places. Find resources that help you understand how CUPS is used for printer management. Submit one resource from the ITT Tech Virtual Library and one from the Chapter 14 suggested resources. ITT Tech Virtual Library The More Information section of textbook Chapter 14, page 561 Use the following keywords and phrases to help you locate appropriate resources: CUPS server CUPS in Linux Linux printer configuration Fedora 15 printer server Unit 5 Search and explore in the following places. Find resources that help you understand mail services in Linux. ITT Tech Virtual Library The More Information section of textbook Chapter 20, page 732 Use the following keywords and phrases to help you locate appropriate resources: Send mail configuration SMTP in Linux Dovecot Email servers in Linux Fedora 15 email server Unit 6 Search and explore the ITT Tech Virtual Library for information on the uses of yum. Use the following...
Words: 467 - Pages: 2
...Information Systems A Proposal To: Jeremy Black February 13, 2013 Contents Welcome 3 Performance Objective 3 Where to Start 3 Understand Information Systems 4 Management information System 4 Office Automation system 4 Supply Chain Management System 4 Electronic Commerce System 4 Executive Dashboard 4 Proposal 5 Thank You 6 [ ] Mr. Black, Thank you for contacting Wizard Tech for your information system needs for your company. We are honored to provide you with information on a variety of systems that are available for your company. This proposal will provide you with information on each system and address any question you may have concerning each system. Should you still have question or concerns please contact our office anytime. The contact information is located on the last page of this proposal. Performance Objective Information recording has change throughout the years through the change in technology. Technology advancements are changing the needs of companies to compete in their respectful markets. Here at Wizard Tech we know that it can be stressful for business owners to choose the correct information system to use for their new business. Our goal is to minimize your stress by walking you through picking your new system, installing it for you, and provide the necessary training needed to operate the new system. Where to Start When starting a new business it can be hard to choose the right information...
Words: 847 - Pages: 4
...Mirzoyan Table of Contents Introduction About company, mission statement. Products and services Market and competitors Industry Analysis The main challenge Firm Analysis Impact of the challenge Strategic Advantage Profile Strengths and competitive advantages Weaknesses and competitive disadvantages Threat-Opportunity profile Opportunities Threats Salient issue for the organization Strategic Alternatives Recommendation Risks Bibliography Appendices Introduction About company "Lime Tech" is specialized in IT consulting and business automation systems. The company was established in 2008 and during 3 years has developed, produced and implemented 10 different types of products. The company produces the following products: ● ● ● ● ● ● ● Queuing Management Systems Information kiosks Electronic lecterns, Internet kiosks, Payment kiosks, Music boxes, Vending machines "Lime Tech" has successfully cooperated with Governmental and nongovernmental major Armenian organizations: State Revenue Committee by the Government of RA, Police of RA, Public Registry of RA, "Vivacell& MTS", "Beeline", "AmeriaBank", "ArmSwissBank", "InecoBank", "Mellat Bank", USAID, UNDP, etc., deploying more than 150 kiosks in Armenia. The advantage of LImeTech is in concentrating its efforts on building unique customized solutions for each of its clients. The main question for the company is "Have I done everything in my power to ensure that this...
Words: 6349 - Pages: 26
...enforcement and major tech companies have been at a stalemate because of this predicament. The government should not be allowed to commission digital information from tech companies because of a customer's fourth amendment rights, their lack of consent, and the dangerous precedents it could set. One of the most important reasons that the law should not be allowed to seize data from our technological devices is the 4th amendment, which applies to all American citizens. The 4th amendment explicitly states, “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.” This excerpt from the bill of rights simply states that law enforcement cannot...
Words: 555 - Pages: 3