Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to:
clarify instructions
communicate with peers and supervisors
present information
seek assistance and expert advice
literacy skills to:
interpret user manuals, technical documentation and help functions
read and write basic workplace documents
problem-solving skills to address common operational problems when carrying out system backup and recovery
technical skills to perform:
backup and recovery operations
basic diagnostic tests in system integrity.
Required knowledge
broad knowledge of:
organisational standards regarding:
backup and recovery procedures and operations
label and store backups
current industry-accepted hardware and software products
current viruses and protection methods
diagnostic tools
inventory procedures
maintenance procedures
storage and retrieval guidelines
system performance
software copyright and general public licence (GPL) or copyright responsibilities.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Backup schedule may occur: | evenings weekdays weekends monthly yearly or a combination. |
Storage media may include: | CD and DVD external storage devices, such as universal serial bus (USB) flash drive internal storage devices. |
Hardware may include: | networked systems personal computers tools to perform tape backups. |
Organisational standards may include: | backup procedures GPL and copyright licences reporting of non-compliant software restore and security procedures software licence documentation virus scanning and removal procedures. |
Appropriate person may include: | authorised business representative client supervisor system administrator. |
Virus protection may include: | freeware online open source proprietary software: BitDefender CA Vet Antivirus Kaspersky Antivirus McAfee VirusScan Panda Antivirus Symantec Norton Antivirus. |
Operating system may include: | GNUs Not Unix (GNU) Linux Mac OS X Microsoft Windows Unix-like operating systems: HP-UX IBM AIX Silicon Graphics IRIX Sun Solaris. |
Licensed software may include: | corporate licences educational licences freeware open source shareware licences single-user licences user-restrictive licences. |
Software may include: | application: database internet browser spreadsheet word-processing commercial customised in-house programming: assembler compiler development tools system: computer security device drivers operating system. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist