Wednesday, 12 June 2013

Personal Development Plan

Personal Development Plan Overview
Task 1 >
 
Useful Information:
The following table outlines the skills that are necessary to succeeded in the web design and computer systems industries and will be covered during the remainder of year 12.
Computer Systems (Unit 2)
Website Production (Unit 28)
Knowledge of Computer Hardware Components
Knowledge of web architecture and components which enable internet and web functionality
Knowledge of Operating Systems
Knowledge of user side and server side factors that can influence website usability
Knowledge of Software Utilities
Knowledge of security risks and protection mechanisms that can effect website performance
Knowledge of Installing Hardware/Software Components
Ability to create a consistent website that meets a client’s needs, including:

1.       Text/Images
2.       Templates
3.       Interactive Objects
4.       Importing of different media


Ability to design a website that meets client’s needs.



P7 – Creating a Personal Development Plan
Computer Systems (Unit 2)
Strengths
Possible Areas to Develop

Knowledge of computing systems


Knowledge of computer components


Know a lot about software utilities



Know how to install software









By learning about the ways of the computer and how the systems work.

By understanding the components of the computer, you will know the ins and outs.

By understanding software utilities, you will understand the knowledge and skills of the software.




Website Production (Unit 28)
Strengths
Possible Areas to Develop

Knowledge of Coding (HTML, PHP)

Knowledge of Software for coding

Knowledge of Flash and Javascript







 
Priority 1

Priority 2

Priority 3

Priority 4

Priority 5

Priority 6




3.       Development Opportunities
Explain how you hope to improve the skills that you have highlighted. What resources/opportunities will be at your disposal (e.g. lesson time, online tutorials)













4.       Formulate Action Plan – Set Targets
Create a set of SMART targets based on your identified needs from the previous section.
Target 1

Target 2

Target 3

Target 4

Target 5

Target 6

Email Report

Email Report

BCC & CC

BCC is known as Blank Carbon Copy and CC is Carbon Copy. These are always used in emails as they mean you can copy your email to other recipients. The BCC is different as it means it will give a Blank copy of the email and CC means it will give the exact copy of the Email. It also shows to the contact you sent to as well who you’ve sent to it as well.

Spam Filters

Spam filters are commonly used in emails to filter the bad and the good emails for example viruses or just random junk. Email filtering is the processing of email to organize it according to specified criteria. Most often this refers to the automatic processing of incoming messages, but the term also applies to the intervention of human intelligence in addition to anti-spam techniques, and to outgoing emails as well as those being received. Email filtering software inputs email. For its output, it might pass the message through unchanged for delivery to the user's mailbox, redirect the message for delivery elsewhere, or even throw the message away. Some mail filters are able to edit messages during processing.
Phishing
Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Viruses
An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be remailed to everyone in your address book. Although not the only kind of computer virus, e-mail viruses are the best known and undoubtedly cause the greatest loss of time and money overall.
The best two defenses against e-mail viruses for the individual user are: A policy of never opening (for example, double-clicking on) an e-mail attachment unless you know who sent it and what the attachment contains, and
installing and using anti-virus software to scan any attachment before you open it.

Rules
The rules of email etiquette are not "rules" in the sense that I will come after you if you don't follow them. They are guidelines that help avoid mistakes (like offending someone when you don't mean to) and misunderstandings (like being offended when you're not meant to). These core rules of email etiquette help us communicate better via email.