1.1.1 I can describe the purpose for using IT.

What are the benefits of using technology and what are the different tasks that technology helps to complete more effectively? Discuss a wide range of examples and evaluate alternatives.


1.1.2 I can describe the methods, skills and resources required to complete tasks successfully.

How do we plan the use of technology to complete a task? Consider the System Design Lifecycle (Identify, Research, Analyse, Design, Implement, Test, Evaluate) and its role in the successful completion of tasks. What skills do you require when completing tasks?


1.1.3 I can plan how to carry out tasks using IT to achieve the required purpose and outcome.

Discuss the use of project timelines, work plans, etc and their role in ensuring a task is completed on time and meets the success criteria. Discuss at least one example in detail of how you completed a project involving technology successfully.


1.1.4 I can describe factors that might affect the task.

Discuss the different issues that could impact on your ability to complete a task. For example IT failures (hardware, Internet connectivity, etc), personal time issues, illness, ‘feature-creep’, etc. and how you could overcome them.


1.1.5 I can select and use IT systems and software applications to complete planned tasks and produce effective results.

Discuss the equipment that you have access to when completing IT-based tasks (hardware, OS, Software, accessories and peripherals), assess their effectiveness and discuss alternatives. Ideally include screenshots of hardware configurations on your chosen devices.


1.1.6 I can describe how the purpose and outcomes have been met by the chosen IT systems and software applications.

For at least two IT-based tasks, discuss how you completed tasks successfully and analyse how you could make improvements in future. Discuss the use of test plans in ensuring success criteria are met.


1.1.7 I can describe any legal or local guidelines or constraints that apply to the task or activity.

Discuss plagiarism, password security, organisation of files, backup and the broad headings of the school’s Acceptable Use Policy. Include how your working methodology covers these areas.


1.2.1 I can review the on-going use of IT tools and techniques and change the approach as needed.

There are always times when our chosen approach does not work. Discuss times when you had to change your approach and use different equipment than you intended to.


1.2.2 I can describe whether the IT tools selected were appropriate for the task and purpose.

Discuss the ten IT-based tools (hardware and software) that you use the most, saying why you prefer to use those, what alternatives are available and how they helped you complete tasks effectively.


1.2.3 I can assess the strengths and weaknesses in my final work.

For at least two tasks that you completed using IT, discuss the strengths and weaknesses in each. This should be in the form of a thorough evaluation.


1.2.4 I can describe ways to make further improvements to my work.

Extending the review in 1.2.3, discuss how you could correct these weaknesses and produce more effective outcomes in future.


1.2.5 I can review outcomes to make sure they match requirements and are fit for purpose.

Extending the work in 1.1.6, discuss success criteria (quantitative and qualitative) and how you use them to measure the effectiveness of a solution.


1.3.1 I can review the benefits and drawbacks of IT tools and systems used in terms of productivity and efficiency.

Technology does not always make things more efficient. Identify a wide variety of everyday tasks that involve technology and suggest alternatives.


1.3.2 I can describe ways to improve productivity and efficiency.

This criteria is often answered badly. This is not about how you might improve a task, but how you can improve the way you work and use IT. For example, you could type more efficiently if you could touch-type. Creating automatic mailboxes in  an email program would help you avoid missing important emails in the midst of so much spam. Include at least five examples of how you could improve your productivity.


1.3.3 I can develop solutions to improve my own productivity in using IT.

Describe at least three ways that you have improved the way you work by better use of technology. This could include a smartphone app that helped you be more organised, etc.


1.3.4 I can test solutions to check that they work as intended.

Describe the steps that you took when testing a particular product that you created. A completed test-plan would be ideal.


2.1.1 I can describe what web site content and layout will be needed for each page.

2.1.2 I can plan and create web page templates to layout.


These two criteria can be dealt with together. This is a full description of your planning and design process. Colour-schemes, fonts, layouts, lists of pages and anything else that someone other than yourself would use to create the whole website from scratch.


2.1.5 I can describe how copyright and other constraints may affect the web site.


When uploading images, or other files, to a website, we are governed by copyright. In this criteria you need to describe what copyright is and how you ensured that you did not break it. For example sourcing images from “Creative Commons” sites, not just stealing them from the web.


2.1.6 I can describe accessibility issues that might need to be taken into account.


Accessibility is sometimes referred to as Universal Access. We use this to refer to how we make an IT resources available to all, no matter what disability they may have, whether it be a physical, visual or auditory impairment. This could include colour blindness, a severe visual impairment or anything that could make using your website difficult.


2.1.7 I can describe what filetypes to use for saving content.


In this criteria you will need to discuss the properties and functions of all filetypes that you uploaded to your site. The likely ones are:

DOCX (Microsoft Word Documents)

PDF (Adobe PDF Universal Documents

PPTX (Microsoft Powerpoint Documents

PNG (Portable Network Graphics format – used for drawn graphics)

JPEG (Joint Photographic Experts Group images – used for photo images)

You may also have chosen to upload media as:

MP3 or AAC (Audio)

MOV or M4A (Video)


2.3.2 I can identify any quality problems with web sites and describe how to respond to them.


In this criteria discuss how you checked for issues with menus, page layout, font styles and spelling, punctuation and grammar issues to ensure your site was complete and of “near professional” quality.


2.3.3 I can describe how I would select and use an appropriate programme to upload and publish the web site.


In this criteria you must describe the difference between editing a web page online using http: or https: (port 80) to creating a website using a web design program such as Adobe Dreamweaver, which you then upload via ftp: (port 21) using an appropriate program, such as Cyberduck, FileZilla or Forklift.


10.3.1 I can describe how I presented slides to meet needs of my audience and communicated effectively.

What did you do to make sure that the language, colours, fonts and more were accessible to the people that you wanted to read the information on the presentation?


20.3.3 I can recognise copyright and other constraints on the use and transfer of information.

When we use mobile devices, it is very easy to transfer information to and from other devices. What are the restrictions of copyright on music, video and other media that we must pay attention to? How can you legally add media to your device?


20.3.4 I can identify why it is important to stay safe, keep information secure and to respect others when using a mobile device.

What are the security steps you should take when using a mobile device? Consider the risks from open wifi networks, phishing emails, rogue apps and other threats. Discuss eSafety and the issues around hate messages, trolling and sexting.


20.3.5 I can keep information secure when using a mobile device.

Discuss complex passwords, lock codes, backups and encryption.