Google Links

Follow the links below to find material targeted to the unit's elements, performance criteria, required skills and knowledge

Elements and Performance Criteria

  1. Identify infotechnology systems
  2. Types of infotechnology equipment used in the work area are identified
  3. Functions of equipment, component parts and accessories are identified
  4. Applications for workplace activities of different infotechnology equipment and systems are interpreted
  5. Routine faults in operating systems, software applications and operator errors are identified
  6. Sources of information on rectifying/reporting faults with operating equipment, systems and application are identified
  7. Access and operate computer-based equipment and systems
  8. Work environments and equipment are adjusted to meet ergonomic requirements and workplace policies and procedures
  9. Systems are accessed and checked as required for viruses
  10. Equipment is set up for work requirements in accordance with workplace procedures and manufacturers guidelines
  11. Infotechnology equipment and software operating manuals and/or help screens are used to inform work practices
  12. Required application software packages and accessories are selected and accessed
  13. Required file and/or data to be accessed is identified
  14. Files/data are filed in accordance with workplace procedures
  15. Shut-down procedures for files, applications and equipment are followed
  16. Input, store and present files/data
  17. Data is entered using appropriate equipment, keyboard/mouse, bar code reader, touch screen or other system
  18. Accurate input is confirmed
  19. Files are accessed in accordance with workplace procedures
  20. Data is manipulated to suit work requirements and is checked for accuracy
  21. Saved files are accessed through relevant directories
  22. Information and disk/s are stored as required
  23. Information is presented using computerised projection facilities as required
  24. Implement workplace procedures for managing and securing data
  25. Security procedures are followed in accordance with workplace procedures
  26. Precautions against the loss or corruption of data are followed in accordance with workplace procedures