Login

Please fill in your details to login.





btec tech award in dit - component 3

Effective Digital Working Practices
Component 3 is your final, externally assessed unit, and it brings together everything you've learned across the course. It explores how modern organisations rely on digital systems to complete their critical, everyday tasks. You'll investigate the exciting opportunities this creates, like flexible working, but also the serious challenges it brings, such as cyber security threats and legal responsibilities. This component will challenge you to think like a professional, analysing how and why businesses use technology and the wider impact it has on everyone.

Topic A

Modern Technologies


Here, you'll explore the technologies that power modern businesses. You'll look at cloud computing and cloud storage, understanding the difference and why companies use them. You'll also investigate how technology has completely changed the way we work, enabling global teams, remote working, and more flexible hours. You’ll weigh up the positive and negative impacts these technologies have on both organisations and the people who work for them.

time limit
Task 1 Design the Ultimate Remote Work Setup

Imagine you're setting up a brand new, fully remote graphic design company. Your job is to design the perfect digital toolkit for your team using a free online whiteboard.

1
Go to Miro

Visit Miro.com and sign up for a free account. Create a new, blank board. (Alternatively, you can use FigJam or Mural).

2
Create Your Categories

Make four areas on your board with these headings: Instant Communication, Project Tracking, File Storage, and Video Meetings.

3
Build Your Toolkit

Search for the logos of real-world apps (like Slack, Trello, Google Drive, Zoom) and add them to your board under the correct category. For each app, add a digital sticky note explaining in one sentence why you chose it for your company. Try to find at least two options for each category to show you've explored different tools.

Outcome: I can identify different types of collaborative technologies and justify why they should be used for specific tasks in a modern business.

Checkpoint

Topic B

Cyber Security


With more technology comes more risk. This topic dives into the world of cyber security. You'll learn about the different threats that organisations face, from external attacks like hacking and malware to internal risks from employees. More importantly, you'll explore the methods used to prevent these attacks, including passwords, firewalls, and encryption. You'll also learn why having a clear security policy is essential for any business to protect its systems and data.

time limit
Task 2 Can You Spot the Phish?

Let's see if you can beat the hackers at their own game. This quiz, created by Google, uses real examples of phishing emails to test your skills.

1
Visit the Quiz

Go to the official Google Phishing Quiz.

2
Take the Test

Work through the eight scenarios. For each one, carefully examine the email for clues and decide if it's a genuine message or a phishing attack.

3
Learn from the Experts

At the end, the quiz will reveal your score. More importantly, it will explain the tell-tale signs for each example. Read these tips carefully—they are the key to keeping your own (and a future employer's) data safe!

Outcome: I can recognise the common features of a phishing attack and use the clues in an email to decide if it is fraudulent or legitimate.

Checkpoint

Topic C

The Wider Implications of Digital Systems


Using digital systems isn't just about technology; it's also about responsibility. In this section, you'll explore the legal and ethical issues organisations face. You'll look at important laws like the Data Protection Act, which governs how your personal data is used, and the Computer Misuse Act. You'll also discuss ethical topics like net neutrality, the environmental impact of IT, and why companies need an Acceptable Use Policy for their staff.

time limit
Task 3 Create a Data Privacy Infographic

You will create a simple, stylish infographic to explain a key part of the UK's data protection laws.

1
Go to Canva

Visit Canva.com, sign up for a free account, and search for "Infographic" templates. Choose a style you like.

2
Choose Your Topic

Pick one of these data protection rights to explain:

The Right to be Forgotten (The right to have your data deleted).
The Right of Access (The right to ask a company what data they hold about you).

3
Design Your Infographic

Research your chosen right online using Google images to get inspiration.


Then, create a simple, one-page infographic that explains it clearly. You must include a title, a simple definition, at least two relevant icons or graphics, and a real-world example of when someone might use this right.

4
Share it

When you're done, download your infographic as a PNG or PDF file.

Outcome: I can explain a key part of data protection law in a clear and visually engaging way.

Checkpoint

Topic D

Planning and Communication in Digital Systems


To work in IT, you need to be able to explain complex ideas clearly. This final topic looks at the different ways professionals communicate how systems work. You will learn how to interpret and use standard diagrams like flowcharts and data flow diagrams to represent information and processes in a simple, visual way.

time limit
Task 4 Build a Digital Flowchart

In this task, you'll first research the essential building blocks of a flowchart and then use a free online tool to create your own professional-looking diagram for a real-world process.

1
Research the Symbols

Before you can build, you need to know your tools. Open a new tab and use a search engine to find the meanings of the "basic flowchart symbols". Your goal is to understand what these five common shapes represent:

Terminator (Oval shape)
Process (Rectangle shape)
Decision (Diamond shape)
Input/Output (Parallelogram shape)
Flow Lines (Arrows)

2
Choose Your Process

Read through the five options below. Pick one process that you want to map out in your flowchart. I've even given you a google image search link to help. How kind.

1
Website Login: The process of a user logging into a website, which involves checking if the entered password is correct. (Image search)
2
Vending Machine: The process of a vending machine dispensing a snack after checking if enough money has been inserted. (Image search)
3
What to Wear: The simple process of deciding what to wear, based on a check to see if it is raining outside. (Image search)
4
Making Tea: The process of making a cup of tea, which includes a decision on whether the user wants to add sugar. (Image search)
5
ATM Withdrawal: The process of withdrawing cash from an ATM, which involves checking if the user's PIN is correct and if they have enough funds in their account. (Image search)

3
Build Your Flowchart

Go to the free online tool at https://app.diagrams.net/ (it requires no sign-up). Using the shapes on the left-hand menu and the knowledge you just researched, build a logical, step-by-step flowchart for your chosen process. You must use the correct symbols for starting, stopping, actions, and at least one decision.

4
Export Your Work

When your flowchart is complete and easy to follow, go to File > Export as > PNG to save an image of your finished diagram.

Outcome: I can map out a process logically using the correct, industry-standard flowchart symbols for actions and decisions.

Checkpoint

Last modified: September 12th, 2025
The Computing Café works best in landscape mode.
Rotate your device.
Dismiss Warning