For Pass standard , learners will explain why common applications are customised and
integrated using the different types of application software. They will understand the
difference between customisation and integration and they will explain the issues
related to customised and integrated applications. For example, a spreadsheet may be
customised to improve productivity through the automation of repetitive tasks by using
a macro.
Learners will explain how common applications are customised and integrated to meet
organisational needs. For example, a spreadsheet may be customised by adding a data
entry form so that data can be shared and integrated in a database used by other parts
of the organisation.
Overall, the evidence will be logically structured but may be basic in parts. For example,
learners may state that error checking and validation are important issues to consider
when customising a spreadsheet, but may not link their statement back to the context to
explain why it is important (to ensure that data is valid and reliable) and that some data
may not need to be checked and validated if it is not important. The evidence may
contain minor technical inaccuracies or omissions.
Learning aim B The assignment should develop learners’ knowledge and understanding of customising
and integrating applications through a series of at least six short software-related
activities.
For Distinction standard , learners will critically analyse how applications are
customised and integrated by using short example solutions. They will present
the outcome of methodical and detailed examination of the solutions. They will
include consideration of alternative ways of completing the activities and provide
recommendations for their preferred approach. For example, to create the user
interface for a given database, learners may consider the security implications of
different approaches. The preferred approach might be to hide the password as
it is entered and to check the content and length of the password as it offers better
protection of sensitive data than a less secure approach to only check the content
of the password.
Overall, the evidence will demonstrate high-quality communication through the use of
accurate and fluent vocabulary, supporting a logically structured and thought-out
response that clearly connects reasoning.