U
NIT
14:
C
USTOMISING AND
I
NTEGRATING
A
PPLICATIONS
Pearson BTEC International Level 3 Qualifications in Information Technology –
Specification – Issue 3 – September 2022 © Pearson Education Limited 2022
197
Content
Learning aim A: Investigate the customisation and integration of
applications used by organisations to meet their needs
A1 Types of application software
Investigate the use of application software that can be customised and integrated:
•
office, e.g. word-processing software, spreadsheet software, database software,
presentation software
•
internet, e.g. web browser software, email software
•
security, e.g. antivirus software, firewall software
•
cloud software, e.g. Google Docs™, Dropbox™, Microsoft OneDrive
®
,
Google Drive™, iCloud
®
, Adobe Document Cloud
®
.
A2 Purpose of and issues with customising and integrating applications
The concepts and requirements of customising and integrating applications.
•
Differences between the approach of customising applications and integrating
them:
o
customising applications involves modifying the user interface, e.g. grouping
frequently used tools and simplifying the interface and/or adding additional
capabilities, e.g. automating repetitive tasks and creating new analytical
procedures
o
integrating applications involves sharing of processes and data among different
applications, e.g. presentation, database(s), and communication software and
devices, e.g. smartphones, wearable devices, tablets.
•
Purpose of customising and integrating applications is to facilitate data sharing
between applications and devices, automate complex tasks, extend
functionality of the software, add finesse to a solution, and to improve the
performance, usability and efficiency of a solution.
•
Common issues with data customisation and integration, including:
o
misinterpretation of requirements, e.g. verification and validation, data
integrity, lack of user involvement, user-friendliness
o
consistency and composition, e.g. validation, error checking the format
o
communication protocols, e.g. Transmission Control Protocol/Internet Protocol
(TCP/IP), Network Time Protocol (NTP), acknowledgement, message delivery
o
data sharing and service delivery capabilities, e.g. security, access violation
o
data security and cloud technology, e.g. data breaches, hacked interfaces and
APIs, permanent data loss, denial-of-service (DOS) attacks and shared
technology.
•
Solutions to these issues, e.g. for data security and cloud technology data
compartmentalisation, and SaaS.
Dostları ilə paylaş: