Preview

Information Technology PAT GR 12 2015 Eng

Powerful Essays
Open Document
Open Document
10343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology PAT GR 12 2015 Eng
INFORMATION TECHNOLOGY

GUIDELINES FOR
PRACTICAL ASSESSMENT TASKS

2015

These guidelines consist of 39 pages.

Copyright reserved

Please turn over

Information Technology

2
NSC

DBE/PAT 2015

TABLE OF CONTENTS
1.

INTRODUCTION

3

2.

TEACHER GUIDELINES

4

2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10

4
5
5
6
7
7
7
7
8
8

3.

4.

Ideas and approaches for guiding learners
Malpractice
Learner authentication of the PAT
Role of the teacher
Supervised/Controlled conditions
Managing the PAT
Assessment evidence
Interview
Requirements
Non-compliance

LEARNER GUIDELINES

10

3.1
3.2
3.3
3.4
3.5
3.6
3.7
3.8
3.9
3.10
3.11

10
11
12
13
15
16
16
16
17
19
21

What is the PAT?
Mark allocation
The topic
Overview
PAT requirements
What you need in order to do the PAT
Malpractice
Non-compliance
Instructions for Phase 1
Instructions for Phase 2
Instructions for Phase 3

CONCLUSION

ADDENDUM A:
ADDENDUM B:
ADDENDUM C:
ADDENDUM D:

22

Assessment tools
Anatomy of a report
Learner declaration
Declaration of authenticity

23
37
38
39

ACRONYMS
CAPS
Curriculum and Assessment Policy Statement
FET
Further Education and Training
NCS
National Curriculum Statement
NSC
National Senior Certificate
PAT
Practical Assessment Task
POA
Programme of Assessment
SBA
School-based Assessment

Copyright reserved

Please turn over

Information Technology

1.

3
NSC

DBE/PAT 2015

INTRODUCTION
The 16 Curriculum and Assessment Policy Statement subjects which contain a practical component all include a practical assessment task (PAT). These subjects are: •





AGRICULTURE:
ARTS:
SCIENCES:
SERVICES:
TECHNOLOGY:

Agricultural Management Practices, Agricultural Technology
Dance Studies, Design, Dramatic Arts, Music, Visual Arts
Computer Applications Technology, Information Technology
Consumer Studies, Hospitality Studies, Tourism
Civil Technology, Electrical Technology, Mechanical
Technology and Engineering Graphics and Design

A practical assessment task (PAT) mark is a compulsory component of the final

You May Also Find These Documents Helpful

  • Powerful Essays

    Assessment 2 Ptlls

    • 1682 Words
    • 7 Pages

    Assessment Question 2Summarise the current legislative, regulatory requirements and professional codes of practice, including the Equality Act, Data Protection Act, Health and Safety Act and Safeguarding Act and any other legislation that you have to comply with when teaching in your specialist area.…

    • 1682 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Oxford Brooks University (2002) Purposes and Principles of Assessment [online] available at: http://www.brookes.ac.uk/services/ocsd/2_learntch/briefing_papers/p_p_assessment.pdf (accessed on: 28/05/12)…

    • 1983 Words
    • 8 Pages
    Best Essays
  • Good Essays

    A1 Award 1 - Understand the principles and requirements of assessment. 1.1 Explain the functions of assessment in learning and development.    What is initial assessment and how does this identify learner’s needs? What is formative assessment and how does this track learner’s progress? What is summative assessment and how does this assess learner’s achievement?…

    • 1167 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Information Technology

    • 760 Words
    • 4 Pages

    ____ presents a comprehensive information security model and has become a widely accepted evaluation standard for the security of information systems.…

    • 760 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 406 Words
    • 2 Pages

    In the final project, you play the role of a network consultant hired to design a new network for a company called Acme Manufacturing. Acme expects a network design document that includes your recommendations.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Information Technology

    • 729 Words
    • 3 Pages

    Please note that this Assessment document has 5 pages and is made up of 4 Sections.…

    • 729 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Technology

    • 765 Words
    • 4 Pages

    The act was implemented in Federal Reserve Board Regulation E which outlined the responsibilities of the customer and of the financial institution. When an EFT error has occurred the responsibility of the customer include:…

    • 765 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    tqco function

    • 1604 Words
    • 36 Pages

    Birmingham City Schools PreAP -PRECALCULUS Suggested PACING GUIDE LESSON PLAN Day/Number 1 Alabama & Common Core Course of Study Objectives    Activity Classroom Rules & Regulations Policies & Procedures Course Curriculum / Syllabus LTF Activity: Interval Notation (Precal) 2  Pre-Assessment 3&4 1.2 Functions and Their Properties 5 LTF Activity: - Describing Graphs (Precalculus) 6 1.3 Twelve Basic Functions LTF Activity: Characteristics of Functions (Algebra 2) 7 8&9 1.3 Twelve Basic Functions (cont.) 1.6 Graphical Transformations Review of Basic Graphs and Transformations PreAP Pre-Calculus Pacing Guide Revised June 2012 1 Birmingham City Schools PreAP -PRECALCULUS…

    • 1604 Words
    • 36 Pages
    Satisfactory Essays
  • Powerful Essays

    Psslc Mathematics

    • 9237 Words
    • 37 Pages

    stakeholders – an overview of the Mathematics program at the secondary level. Those in education,…

    • 9237 Words
    • 37 Pages
    Powerful Essays
  • Satisfactory Essays

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them. Although it may occur accidentally through programming error, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes designed to trigger specific actions, in effect sending new instructions to the attacked computer that could, for example, damage the user's files, change data, or disclose confidential information. Buffer overflow attacks are said to have arisen because the C programming language supplied the framework, and poor programming practices supplied the vulnerability.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Minor

    • 15260 Words
    • 62 Pages

    7 .1 7 .2 7 .3 7 .4 7 .5 Guidance on selecting the Computing Project Guidance on marking the Computing Project Candidate record card for the Computing Project Coursework assessment summary form for the Computing Project Paper 4 marking grid…

    • 15260 Words
    • 62 Pages
    Satisfactory Essays
  • Powerful Essays

    Information Technology

    • 5593 Words
    • 23 Pages

    MRUTC Project 08-07: A Methodology for Integrating Roadway Safety Hardware Management into the Overall Highway Asset Management Program…

    • 5593 Words
    • 23 Pages
    Powerful Essays
  • Powerful Essays

    A LAN (local area network) is a group of computers and network devices connected together, usually within the same building. By definition, the connections must be high speed and relatively inexpensive (e.g., token ring or Ethernet). Most Indiana University Bloomington departments are on LANs.…

    • 2384 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Information Technology

    • 518 Words
    • 3 Pages

    The term ‘Information Technology’ or simply known as IT is a generic name given to all improvements that are taking place in our world due to the inter-linked advancement in technology, learning, and information. The term refers to recent technological developments that are taking place in our world as a result of better technology, due to better information.…

    • 518 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Information Technology

    • 729 Words
    • 3 Pages

    The following paper will explain why important laws are passed due to the advancements in information technology which could result in ethical problems to arise requiring the formation of these laws. The first act is the Do Not Call Implementation Act, 2003 and the second act is the Children’s Internet Protection Act, 2000. These acts are important because new technologies can lead to unethical business practices, and child exploitation.…

    • 729 Words
    • 3 Pages
    Good Essays