Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
literacy skills to:
interpret user manuals, technical documentation and help functions
maintain inventory records
record software licence records
communication skills to:
communicate with peers and supervisors
present and explain information
seek assistance and expert advice
planning and organisational skills to plan and develop a backup and restore strategy
technical skills to:
configure user account and security access details
identify unlicensed software
record user account and security access details.
Required knowledge
backup procedures
operating systems used by the organisation
organisational security procedures
organisational standards to:
carry out backup and restore operations
label and store backups
selection, functions and features of appropriate diagnostic tools
software copyright responsibilities
system's current functionality.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Client may include: | employee external organisation individual internal department. |
Organisational requirements may include: | availability of system to be optimised client-support documentation complexity of technical manuals information and communications technology (ICT) policy and procedures relating to service levels and installation in-house or vendor ICT purchasing arrangements register of licences security procedures storage of ICT documentation system administration and backup procedures type of product licences. |
Documentation may follow: | audit trails client training International Organization for Standardization (ISO), International Electrotechnical Commission (IEC) and Australian Standards (AS) standards maintaining equipment inventory naming standards project-management templates and report writing satisfaction reports version control. |
Software may include: | application: database internet browser spreadsheet word-processing commercial applications customised in-house programming: assembler Java, VB, C++, Visual Fox Pro compiler development tools system: computer security operating system. |
Records may include: | databases spreadsheets vendor tools to create, modify and document user accounts access to computer or network resources. |
Appropriate person may include: | authorised business representative client supervisor system administrator. |
Organisational guidelines may include: | communication methods content of emails dispute resolution document procedures and templates downloading information and accessing particular websites financial control mechanisms opening mail with attachments personal use of emails and internet access virus risk. |
Operating systems may include: | GNU and Linux Mac OS X Microsoft Windows Unix-like operating systems: HP-UX IBM AIX Silicon Graphics IRIX Sun Solaris. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist