Elaboration (3) ACTDIP038
identifying the range of stakeholders who are associated with solutions but are not direct users and using techniques such as interviewing and reinterviewing to clarify needs
Elaboration (3) | ACTDIP038 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (5) ACTDIP038
testing a range of text and graphical user interface designs with clients who have different needs on the basis of time taken to complete the task and the number of errors made
Elaboration (5) | ACTDIP038 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (4) ACTDIP042
reviewing the ‘terms of use’ policies on social media networks and predicting ways in which these can support advocacy of change and protection of individuals and societies
Elaboration (4) | ACTDIP042 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (5) ACTDIP042
reviewing state, national and regional policies and analysing the potential impact of each. Examples of policies include: Australian Government Protective Security Policy Framework, the Australian Government ICT Sustainability Plan 2010–2015; the Green …
Elaboration (5) | ACTDIP042 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (2) ACTDIP039
evaluating aspects of the total user experience, that is, all aspects of the system as perceived by the users, for example, a user’s initial experience of setting up and using a system, or a user’s emotional or cultural response to using a digital sy …
Elaboration (2) | ACTDIP039 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (3) ACTDIP042
examining the ICT policy for schooling and evaluating the impact on education
Elaboration (3) | ACTDIP042 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum
Elaboration (3) ACTDIP044
investigating major causes of threats to data, for example human actions such as losing a storage device, disclosing passwords, theft and fraud
Elaboration (3) | ACTDIP044 | Content Descriptions | Years 9 and 10 | Digital Technologies | Technologies | F-10 curriculum