Preview

Computer Applications Technology Stuffs

Satisfactory Essays
Open Document
Open Document
13264 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Applications Technology Stuffs
COMPUTER APPLICATIONS
TECHNOLOGY

GUIDELINES FOR
PRACTICAL ASSESSMENT TASKS

2014

These guidelines consist of 49 pages.

Copyright reserved

Please turn over

Computer Applications Technology

2
NSC – Learner Guide

DBE/PAT 2014

CONTENTS
W hat i s t h e P AT ? ....................................................................................................................................... 4
Mark allocation ........................................................................................................................................ 4
T opic ................................................................................................................................................................ 5
O v erv i ew of t a s ks ...................................................................................................................................... 6
Phase 1 ....................................................................................................................................................... 6
Phase 2 ....................................................................................................................................................... 6
Phase 3 ....................................................................................................................................................... 6
General ....................................................................................................................................................... 6
W hat yo u w il l n e ed t o c o mp l et e t h e P AT ? ...................................................................................... 7
M iscond uct ................................................................................................................................................... 7
No n- com pl ia n c e

You May Also Find These Documents Helpful

  • Good Essays

    Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7…

    • 1774 Words
    • 8 Pages
    Good Essays
  • Good Essays

    I was able to listen to a podcast called famous tumors. It talked about many different types of rare case tumors. Such as president Ulysses S. Grant, Tasmanian devils, a man with a safety pin, a nun and God, and a lady and her daughter.…

    • 862 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    •Name and describe the only language that computers understand and explain how the instructions that people write for computers get into that form…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Senior Design Project

    • 13188 Words
    • 53 Pages

    reduce water and ice buildup on the bridges. The first option would be to pitch or grade…

    • 13188 Words
    • 53 Pages
    Powerful Essays
  • Satisfactory Essays

    Information Technology

    • 389 Words
    • 2 Pages

    Use the Microsoft Baseline Security Analyzer (MBSA) to detect the patches and updates that may be missing from your current installation. MBSA compares your installation to a list of currently available updates maintained in an XML file. MBSA can download the XML file when it scans your server or you can manually download the file to the server or make it available on a network server.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Terrorism provides a unique challenge for emergency responders. Although they share many similar qualities as regular crimes, there may be an added danger. One such danger is the use of weapons of mass destruction. Responding to terrorism falls primarily into the realm of federal law enforcement; however, major incidents will often require the use of multiple agencies from multiple jurisdictions. A disorganized response force could spell doom for the victims. This is why the Incident Command System is so important in the prevention and mitigation of disaster effects.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Time Warner Cable (TWC) is one of the nation’s largest cable companies and being such has a large network of hardware and software at its disposal. According to "Time Warner Cable" (2013), its mission statement is to connect people and businesses with information, entertainment, and to give customers controls that are simple and easy to use. TWC utilizes Microsoft Windows XP and Microsoft Office giving the employees access from a TWC location or by a virtual private network (VPN) setup by the employee. Employees also have access to web based email that can be accessed via the internet anywhere in the World. In today’s business environment, technology is continually changing and improving. Operating systems and applications are used within companies worldwide to gather, disseminate, and control the flow of information. The application software can range from general covering a broad spectrum of information to addressing very specific information, enabling an organization to meet objectives.…

    • 796 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 277 Words
    • 1 Page

    How is information used in the modern enterprise? How does this use affect IT systems?…

    • 277 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    1. In relation to your current business environment (or one that you are familiar with), identify at least two different types of information technology that may be used when completing work tasks.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    information technology

    • 420 Words
    • 2 Pages

    What are the two meanings of “corporate ethics” in organization today? What does each definition imply for IT practices? How does the economic environment affect this?…

    • 420 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TABLE OF CONTENT ..................................................................................................................................................................... 1 SHORT QUESTIONS PAPER ........................................................................................................................................................... 5 SET-01 ............................................................................................................................................................................................... 5 Convert the given infix form to postfix form. ............................................................................................................................... 5 A+B/C-D^E-F ................................................................................................................................................................................ 5 How we can implement Table ADT using Linked List................................................................................................................... 5 If we allow assignment to constants what will happen? ............................................................................................................. 5 How heap sort works to sort a set of data.…

    • 25473 Words
    • 102 Pages
    Powerful Essays
  • Satisfactory Essays

    |C| | |o| | |l| | |o| | |m| | |b| | |o| | |W| | |a| | |s| | |t| | |e| | |M| | |a| | |n| | |a| | |g| | |e| | |m| | |e| | |n| | |t| | | | | | | | |D| | |u| | |e| | |t| | |o| | |t| | |h| | |e| | |n| | |u| | |m| | |e| | |r| | |o| | |u| | |s| | |a| | |r| | |t| | |i| | |c| | |l| | |e| | |s| | |o| | |n| | |t| | |h| | |i| | |s| | |i| | |s| | |s| | |u| | |e| | |I| | |h| |…

    • 16903 Words
    • 68 Pages
    Satisfactory Essays
  • Better Essays

    Adulteration

    • 2279 Words
    • 10 Pages

    wi t ho ut whi c h t hi s pr oj ec t woul d not ha ve c ome f or t h. I woul d a l s o l i ke t o…

    • 2279 Words
    • 10 Pages
    Better Essays

Related Topics