Critical aspects for assessment and evidence required to demonstrate competency in this unit | Evidence of the ability to: install, configure and troubleshoot computer applications customise computer applications anticipate and respond to a range of security incidents. |
Context of and specific resources for assessment | Assessment must ensure access to: appropriate OS installation CD or recovery boot discs computers with application errors samples of operating system patches stand-alone or networked personal computer appropriate learning and assessment support when required modified equipment for people with special needs. |
Method of assessment | A range of assessment methods will be used to assess practical skills and knowledge for example: evaluation of a security breach and a non-functional mail box direct observation of the candidate troubleshooting and repairing corrupted data verbal or written questioning of typical systems and procedures of user support. |
Guidance information for assessment | Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, where appropriate. Assessment processes and techniques must be culturally appropriate, and suitable to the communication skill level, language, literacy and numeracy capacity of the candidate and the work being performed. Indigenous people and other people from a non-English speaking background may need additional support. In cases where practical assessment is used it should be combined with targeted questioning to assess required knowledge. |