Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our cookie policy.

ZigZag Education Photocopiable and digital teaching resources
Basket
  • Home
  • About Us
    About ZigZag Education Become an Author Vacancies Affiliates
  • FAQ
    Frequently Asked Questions Delivery Licensing Terms & Conditions Inspection Copies Fast Shop (for accounts departments)
  • Contact
  • Sign In
  • Computer Science and IT
  • Weblinks
  • 10758 - T Level DSS Course Companions - Content Areas 1-8

Weblinks and videos for use with 10758 – T Level DSS Course Companions - Content Areas 1-8

Fault indicators (2.4.4–2.4.5)

  • Computer POST and beep codes
  • BBC: Happy
  • Happy Hat
  • ZigZag Education: Landing Admin
  • ZigZag Education: Administrator


Common data formats (3.5.1)

  • JSON Syntax


Health and safety legislation (4.1.1)

  • The Health and Safety (Display Screen Equipment) Regulations 1992
  • Working safely with display screen equipment


Health and safety risks and preventative measures (4.1.2)

  • Display screen equipment (DSE) workstation checklist


Data security and protection (4.1.3)

  • ICO
  • Exodus
  • Terms of Service Didn't Read
  • Article: I read all the small print on the internet and it made me want to die
  • European Commission
  • Enforcement Action


Equality legislation (4.1.5)

  • Equality Act 2010: guidance
  • Case study: client wins over £30,000 in Employment Tribunal after successful disability discrimination claim
  • Challenging race discrimination in adoption
  • Acas: Making working life better for everyone in Britain
  • Citizens Advice
  • Equality Advisory Support Service (EASS)


Intellectual property legislation (4.1.6)

  • Intellectual property and your work
  • Guidance: Non-disclosure agreements
  • Intellectual Property Office
  • Espacenet


Sources of codes of conduct (4.2.1)

  • BCS Code of Conduct
  • IAP Code of Conduct
  • Chartered Institute of Information Security Code of Conduct


Codes of conduct influence professional behaviour (4.2.2)

  • ACM Code of Ethics and Professional Conduct


Digital industry standards (4.2.3)

  • WCAG 2 Overview


Purpose of acceptable use policies (AUP) (4.2.4)

  • Sample Acceptable Usage Policy


Whistleblowing procedures (4.2.5)

  • Whistleblowing for employees


Processes, benefits and drawbacks of the change management process (5.4.4)

  • Change management


Importance of digital inclusion (6.1.2)

  • How We Analyzed the COMPAS Recidivism Algorithm
  • Accessibility statement for www.gov.uk


Impacts of developments in technologies (6.2.1)

  • Government advances plans to boost security of smart products
  • Open UK
  • Be open and use open source
  • Software: Free and Open-Source Code
  • Regulations: Waste Electrical and Electronic Equipment (WEEE)


Types of physical computers (7.1.1)

  • Fitness tracking app Strava gives away location of secret US army bases


Key features of virtual environments (7.4.2)

  • Why Migrate to the Cloud: 11 Benefits to Your Business


Improving resilience in digital environments (7.6.2)

  • 7 Strategies to Avoid Data Loss from Natural Disaster


Potential impact of failing to maintain privacy and confidentiality (8.1.3)

  • Capital One
  • Enforcement action


Common threat mitigation techniques (8.3.1)

  • Apple backed by judge in new iPhone access fight
  • International Statement: End-To-End Encryption and Public Safety
  • Top tips for staying secure online
  • Video: Nmap Tutorial to find Network Vulnerabilities

© ZigZag Education®, Unit 3, Greenway Business Centre, Doncaster Road, Bristol BS10 5PY | Privacy Policy | Cookie Policy | Accessibility Policy 🤖 | Follow Us Join Us