Unit of Competency Mapping – Information for Teachers/Assessors – Information for Learners

ICPSUP381 Mapping and Delivery Guide
Operate and maintain computer resources

Version 1.0
Issue Date: April 2024


Qualification -
Unit of Competency ICPSUP381 - Operate and maintain computer resources
Description
Employability Skills
Learning Outcomes and Application This unit describes the skills and knowledge required to undertake basic computing skills including routine personal computer maintenance, upgrades, restorations, data storage, conversion and transmission.It applies to individuals who perform a range of defined tasks relating to the printing and graphic arts industry, and who may also provide some leadership and guidance to others with some limited responsibility for the output of others.No licensing, legislative or certification requirements apply to this unit at the time of publication.
Duration and Setting X weeks, nominally xx hours, delivered in a classroom/online/blended learning setting.

Gather evidence to demonstrate consistent performance in conditions that are safe and replicate the workplace. Noise levels, production flow, interruptions and time variances must be typical of those experienced in the Support field of work and include access to special purpose tools, equipment and materials.

Assessors must satisfy NVR/AQTF assessor requirements.

Prerequisites/co-requisites
Competency Field
Development and validation strategy and guide for assessors and learners Student Learning Resources Handouts
Activities
Slides
PPT
Assessment 1 Assessment 2 Assessment 3 Assessment 4
Elements of Competency Performance Criteria              
Element: Perform routine system maintenance
  • Required equipment is checked, and is in working order and available for use
  • Peripherals are fitted, maintained, cleaned and adjusted as required
  • Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations
  • Routine system maintenance and security processes are performed
  • Correct functioning of automated processes is monitored
  • Monitors are adjusted only when being calibrated and are otherwise left alone
  • All abnormalities and system malfunctions are reported
  • Off-line maintenance records are kept up-to-date
       
Element: Perform back-ups and restorations on a personal computer
  • File system back-ups are performed regularly according to established workplace practices
  • Back-up media are labelled, stored and rotated according to established workplace practices
  • Files are restored from back-up as required
  • Data is recovered from damaged and corrupted files using small office tools
  • Adequate written records of back-ups are kept
       
Element: Store and supply consumables
  • Consumables are stored and disposed of according to WHS, care of equipment and system security
  • Stock levels and user needs are monitored to ensure required consumables are available
       
Element: Upgrade and configure a personal computer
  • Software and peripherals are installed, upgraded and configured according to enterprise policy
  • New software, upgrades and adjustments are tested to ensure adequate performance
  • Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment
  • Written records of installations, upgrades and configurations are maintained
       
Element: Access documentation, records and updates
  • Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately
  • Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources
       
Element: Access and deliver data
  • Removable storage devices are connected, disconnected and configured as required
  • Data is accessed from different types of file systems
  • Data is stored and converted to suit a variety of operating systems, environments and applications
  • Data is transmitted effectively by the method most appropriate to the task
       


Evidence Required

List the assessment methods to be used and the context and resources required for assessment. Copy and paste the relevant sections from the evidence guide below and then re-write these in plain English.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Perform routine system maintenance

1.1 Required equipment is checked, and is in working order and available for use

1.2 Peripherals are fitted, maintained, cleaned and adjusted as required

1.3 Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations

1.4 Routine system maintenance and security processes are performed

1.5 Correct functioning of automated processes is monitored

1.6 Monitors are adjusted only when being calibrated and are otherwise left alone

1.7 All abnormalities and system malfunctions are reported

1.8 Off-line maintenance records are kept up-to-date

2. Perform back-ups and restorations on a personal computer

2.1 File system back-ups are performed regularly according to established workplace practices

2.2 Back-up media are labelled, stored and rotated according to established workplace practices

2.3 Files are restored from back-up as required

2.4 Data is recovered from damaged and corrupted files using small office tools

2.5 Adequate written records of back-ups are kept

3. Store and supply consumables

3.1 Consumables are stored and disposed of according to WHS, care of equipment and system security

3.2 Stock levels and user needs are monitored to ensure required consumables are available

4. Upgrade and configure a personal computer

4.1 Software and peripherals are installed, upgraded and configured according to enterprise policy

4.2 New software, upgrades and adjustments are tested to ensure adequate performance

4.3 Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment

4.4 Written records of installations, upgrades and configurations are maintained

5 Access documentation, records and updates

5.1 Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately

5.2 Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources

6. Access and deliver data

6.1 Removable storage devices are connected, disconnected and configured as required

6.2 Data is accessed from different types of file systems

6.3 Data is stored and converted to suit a variety of operating systems, environments and applications

6.4 Data is transmitted effectively by the method most appropriate to the task

Evidence of the ability to:

correctly operate and maintain computer resources

produce log books and written records showing system maintenance and configuration history over a period of THREE months, including all reported abnormalities and how they were addressed

perform a routine system back-up and restore a nominated file from an earlier back-up

convert a document from one common file format to another and make the file available for access on a different platform (eg Macintosh application to MS-Windows application via suitably encoded Internet email attachment)

research and report availability of upgrades and support for TWO pieces of hardware and TWO pieces of software currently in use.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

Work health and safety (WHS) requirements for terminal operators

describe correct positioning of the keyboard, mouse and screen to avoid fatigue

explain when a foot rest is appropriate

Computing technology

describe relationships between baud rate, bits per second and bandwidth

explain the meaning of MIPPS

describe the function of the video card

specify what must be checked before commencement of a software installation or upgrade

Security and storage of data

identify risks that might exist for the system, the enterprise and users if an individual proceeds to install their own software (assuming the software has been scanned for viruses)

describe back-up and restoration procedures currently used, as well as their strengths and weaknesses

explain why hand-written records are kept

describe how to identify and respond to a possible security breach or virus attack

list environmental factors that could cause data loss from removable media

File preparation, conversion and encoding including cross-platform considerations

describe how to retain fonts of converted files

explain differences in file naming conventions between IBM-PC, Macintosh and Unix

list three encoding methods for internet email transmission of files and state which platform each is used for

list four common graphics file formats and when each format should be chosen

Correct use of network and telecommunications technologies

explain how a Macintosh can communicate with another computer

identify types of cabling and network cards installed and their effect on data transmission speed

summarise how to transmit data

describe how to conduct a search for product information on the internet

identify the most efficient way to exchange files with clients or other companies

Specific hardware, peripherals and consumables for the pre-press area

list the configuration of a typical high performance pre-press computer

identify the form of computer language used to drive an image setter

describe types of removable media commonly used in the pre-press area

list pieces of hardware that require periodical cleaning

Pre-press software

specify the limiting factor of most desktop publishing pre-press software

explain where a multitasking computer operating system fits in the pre-press production process

identify appropriate software to:

scan for a virus

produce a logo

manipulate an image

set up a printer network

create a page of text

Information sources

list the machine manuals, safety and other documentation relevant to this task and outline the information included in these documents.


Submission Requirements

List each assessment task's title, type (eg project, observation/demonstration, essay, assignment, checklist) and due date here

Assessment task 1: [title]      Due date:

(add new lines for each of the assessment tasks)


Assessment Tasks

Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Perform routine system maintenance

1.1 Required equipment is checked, and is in working order and available for use

1.2 Peripherals are fitted, maintained, cleaned and adjusted as required

1.3 Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations

1.4 Routine system maintenance and security processes are performed

1.5 Correct functioning of automated processes is monitored

1.6 Monitors are adjusted only when being calibrated and are otherwise left alone

1.7 All abnormalities and system malfunctions are reported

1.8 Off-line maintenance records are kept up-to-date

2. Perform back-ups and restorations on a personal computer

2.1 File system back-ups are performed regularly according to established workplace practices

2.2 Back-up media are labelled, stored and rotated according to established workplace practices

2.3 Files are restored from back-up as required

2.4 Data is recovered from damaged and corrupted files using small office tools

2.5 Adequate written records of back-ups are kept

3. Store and supply consumables

3.1 Consumables are stored and disposed of according to WHS, care of equipment and system security

3.2 Stock levels and user needs are monitored to ensure required consumables are available

4. Upgrade and configure a personal computer

4.1 Software and peripherals are installed, upgraded and configured according to enterprise policy

4.2 New software, upgrades and adjustments are tested to ensure adequate performance

4.3 Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment

4.4 Written records of installations, upgrades and configurations are maintained

5 Access documentation, records and updates

5.1 Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately

5.2 Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources

6. Access and deliver data

6.1 Removable storage devices are connected, disconnected and configured as required

6.2 Data is accessed from different types of file systems

6.3 Data is stored and converted to suit a variety of operating systems, environments and applications

6.4 Data is transmitted effectively by the method most appropriate to the task

Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.

Observation Checklist

Tasks to be observed according to workplace/college/TAFE policy and procedures, relevant legislation and Codes of Practice Yes No Comments/feedback
Required equipment is checked, and is in working order and available for use 
Peripherals are fitted, maintained, cleaned and adjusted as required 
Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations 
Routine system maintenance and security processes are performed 
Correct functioning of automated processes is monitored 
Monitors are adjusted only when being calibrated and are otherwise left alone 
All abnormalities and system malfunctions are reported 
Off-line maintenance records are kept up-to-date 
File system back-ups are performed regularly according to established workplace practices 
Back-up media are labelled, stored and rotated according to established workplace practices 
Files are restored from back-up as required 
Data is recovered from damaged and corrupted files using small office tools 
Adequate written records of back-ups are kept 
Consumables are stored and disposed of according to WHS, care of equipment and system security 
Stock levels and user needs are monitored to ensure required consumables are available 
Software and peripherals are installed, upgraded and configured according to enterprise policy 
New software, upgrades and adjustments are tested to ensure adequate performance 
Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment 
Written records of installations, upgrades and configurations are maintained 
Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately 
Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources 
Removable storage devices are connected, disconnected and configured as required 
Data is accessed from different types of file systems 
Data is stored and converted to suit a variety of operating systems, environments and applications 
Data is transmitted effectively by the method most appropriate to the task 

Forms

Assessment Cover Sheet

ICPSUP381 - Operate and maintain computer resources
Assessment task 1: [title]

Student name:

Student ID:

I declare that the assessment tasks submitted for this unit are my own work.

Student signature:

Result: Competent Not yet competent

Feedback to student

 

 

 

 

 

 

 

 

Assessor name:

Signature:

Date:


Assessment Record Sheet

ICPSUP381 - Operate and maintain computer resources

Student name:

Student ID:

Assessment task 1: [title] Result: Competent Not yet competent

(add lines for each task)

Feedback to student:

 

 

 

 

 

 

 

 

Overall assessment result: Competent Not yet competent

Assessor name:

Signature:

Date:

Student signature:

Date: