The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Perform routine maintenance of own computer system.
|
|
Equipment required to support NatHERS assessment is checked to be in working order and available for use. Completed |
Evidence:
|
Peripherals are fitted, maintained, cleaned and adjusted within scope of own role. Completed |
Evidence:
|
Personal computer furniture and fittings are adjusted to suit user work health and safety, organisational and ergonomic requirements. Completed |
Evidence:
|
Routine system maintenance and security processes are performed within scope of own role. Completed |
Evidence:
|
Correct functioning of automated processes is monitored. Completed |
Evidence:
|
Troubleshooting procedures are followed to address routine problems. Completed |
Evidence:
|
Off-line maintenance records are kept up-to-date. Completed |
Evidence:
|
Manipulate data.
|
|
Advanced features of applications are used in the preparation and presentation of data. Completed |
Evidence:
|
Data is efficiently transferred between applications, linking and embedding related data files as required. Completed |
Evidence:
|
Objects, macros and templates are used for routine activities. Completed |
Evidence:
|
Shortcuts and features are used to increase personal productivity. Completed |
Evidence:
|
Back up and restore files on a personal computer.
|
|
File system back-ups are performed regularly. Completed |
Evidence:
|
Back-up media are labelled, stored and rotated. Completed |
Evidence:
|
Files are restored from back-up as required. Completed |
Evidence:
|
Data is recovered from damaged and corrupted files using appropriate software. Completed |
Evidence:
|
Records of back-ups are kept. Completed |
Evidence:
|
Store and supply consumables.
|
|
Consumables are stored and disposed of, taking into account sustainability, work health and safety, and system security requirements. Completed |
Evidence:
|
Stock levels and user needs are monitored to ensure required consumables are available. Completed |
Evidence:
|
Upgrade and configure a personal computer.
|
|
Software and peripherals are installed, upgraded and configured. Completed |
Evidence:
|
New software, upgrades and adjustments are tested to ensure adequate performance. Completed |
Evidence:
|
Records of installations, upgrades and configurations are maintained. Completed |
Evidence:
|
Access documentation, records and updates.
|
|
Documentation is stored and accessed appropriately. Completed |
Evidence:
|
Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources. Completed |
Evidence:
|
Access and deliver data.
|
|
Removable storage devices are connected, disconnected and configured as required. Completed |
Evidence:
|
Data is accessed from different types of file systems. Completed |
Evidence:
|
Data is stored and converted to suit a variety of operating systems, environments and applications. Completed |
Evidence:
|
Data is transmitted effectively by the method most appropriate to the task. Completed |
Evidence:
|
Access and use support resources.
|
|
Routine problems are resolved using support resources. Completed |
Evidence:
|
Online help is used to overcome difficulties with applications. Completed |
Evidence:
|
Technical support for system problems is accessed, using troubleshooting results and alert messages. Completed |
Evidence:
|