NTISthis.com

Evidence Guide: ICPSUP381 - Operate and maintain computer resources

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICPSUP381 - Operate and maintain computer resources

What evidence can you provide to prove your understanding of each of the following citeria?

Perform routine system maintenance

  1. Required equipment is checked, and is in working order and available for use
  2. Peripherals are fitted, maintained, cleaned and adjusted as required
  3. Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations
  4. Routine system maintenance and security processes are performed
  5. Correct functioning of automated processes is monitored
  6. Monitors are adjusted only when being calibrated and are otherwise left alone
  7. All abnormalities and system malfunctions are reported
  8. Off-line maintenance records are kept up-to-date
Required equipment is checked, and is in working order and available for use

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Peripherals are fitted, maintained, cleaned and adjusted as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Routine system maintenance and security processes are performed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Correct functioning of automated processes is monitored

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Monitors are adjusted only when being calibrated and are otherwise left alone

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

All abnormalities and system malfunctions are reported

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Off-line maintenance records are kept up-to-date

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Perform back-ups and restorations on a personal computer

  1. File system back-ups are performed regularly according to established workplace practices
  2. Back-up media are labelled, stored and rotated according to established workplace practices
  3. Files are restored from back-up as required
  4. Data is recovered from damaged and corrupted files using small office tools
  5. Adequate written records of back-ups are kept
File system back-ups are performed regularly according to established workplace practices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Back-up media are labelled, stored and rotated according to established workplace practices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Files are restored from back-up as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is recovered from damaged and corrupted files using small office tools

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Adequate written records of back-ups are kept

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Store and supply consumables

  1. Consumables are stored and disposed of according to WHS, care of equipment and system security
  2. Stock levels and user needs are monitored to ensure required consumables are available
Consumables are stored and disposed of according to WHS, care of equipment and system security

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Stock levels and user needs are monitored to ensure required consumables are available

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Upgrade and configure a personal computer

  1. Software and peripherals are installed, upgraded and configured according to enterprise policy
  2. New software, upgrades and adjustments are tested to ensure adequate performance
  3. Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment
  4. Written records of installations, upgrades and configurations are maintained
Software and peripherals are installed, upgraded and configured according to enterprise policy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

New software, upgrades and adjustments are tested to ensure adequate performance

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Written records of installations, upgrades and configurations are maintained

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Access documentation, records and updates

  1. Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately
  2. Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources
Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Access and deliver data

  1. Removable storage devices are connected, disconnected and configured as required
  2. Data is accessed from different types of file systems
  3. Data is stored and converted to suit a variety of operating systems, environments and applications
  4. Data is transmitted effectively by the method most appropriate to the task
Removable storage devices are connected, disconnected and configured as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is accessed from different types of file systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is stored and converted to suit a variety of operating systems, environments and applications

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is transmitted effectively by the method most appropriate to the task

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Perform routine system maintenance

1.1 Required equipment is checked, and is in working order and available for use

1.2 Peripherals are fitted, maintained, cleaned and adjusted as required

1.3 Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations

1.4 Routine system maintenance and security processes are performed

1.5 Correct functioning of automated processes is monitored

1.6 Monitors are adjusted only when being calibrated and are otherwise left alone

1.7 All abnormalities and system malfunctions are reported

1.8 Off-line maintenance records are kept up-to-date

2. Perform back-ups and restorations on a personal computer

2.1 File system back-ups are performed regularly according to established workplace practices

2.2 Back-up media are labelled, stored and rotated according to established workplace practices

2.3 Files are restored from back-up as required

2.4 Data is recovered from damaged and corrupted files using small office tools

2.5 Adequate written records of back-ups are kept

3. Store and supply consumables

3.1 Consumables are stored and disposed of according to WHS, care of equipment and system security

3.2 Stock levels and user needs are monitored to ensure required consumables are available

4. Upgrade and configure a personal computer

4.1 Software and peripherals are installed, upgraded and configured according to enterprise policy

4.2 New software, upgrades and adjustments are tested to ensure adequate performance

4.3 Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment

4.4 Written records of installations, upgrades and configurations are maintained

5 Access documentation, records and updates

5.1 Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately

5.2 Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources

6. Access and deliver data

6.1 Removable storage devices are connected, disconnected and configured as required

6.2 Data is accessed from different types of file systems

6.3 Data is stored and converted to suit a variety of operating systems, environments and applications

6.4 Data is transmitted effectively by the method most appropriate to the task

Required Skills and Knowledge

ELEMENT

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1. Perform routine system maintenance

1.1 Required equipment is checked, and is in working order and available for use

1.2 Peripherals are fitted, maintained, cleaned and adjusted as required

1.3 Personal computer furniture and fittings are adjusted according to work health and safety (WHS) practices and protection of equipment considerations

1.4 Routine system maintenance and security processes are performed

1.5 Correct functioning of automated processes is monitored

1.6 Monitors are adjusted only when being calibrated and are otherwise left alone

1.7 All abnormalities and system malfunctions are reported

1.8 Off-line maintenance records are kept up-to-date

2. Perform back-ups and restorations on a personal computer

2.1 File system back-ups are performed regularly according to established workplace practices

2.2 Back-up media are labelled, stored and rotated according to established workplace practices

2.3 Files are restored from back-up as required

2.4 Data is recovered from damaged and corrupted files using small office tools

2.5 Adequate written records of back-ups are kept

3. Store and supply consumables

3.1 Consumables are stored and disposed of according to WHS, care of equipment and system security

3.2 Stock levels and user needs are monitored to ensure required consumables are available

4. Upgrade and configure a personal computer

4.1 Software and peripherals are installed, upgraded and configured according to enterprise policy

4.2 New software, upgrades and adjustments are tested to ensure adequate performance

4.3 Personal computer furniture and fittings are adjusted to meet workplace standards for WHS and care of equipment

4.4 Written records of installations, upgrades and configurations are maintained

5 Access documentation, records and updates

5.1 Documentation, including hardware and software manuals and equipment inventory and service records, is stored and accessed appropriately

5.2 Supplementary product information, updates and technical reference material are accessed using the internet, journals and other sources

6. Access and deliver data

6.1 Removable storage devices are connected, disconnected and configured as required

6.2 Data is accessed from different types of file systems

6.3 Data is stored and converted to suit a variety of operating systems, environments and applications

6.4 Data is transmitted effectively by the method most appropriate to the task

Evidence of the ability to:

correctly operate and maintain computer resources

produce log books and written records showing system maintenance and configuration history over a period of THREE months, including all reported abnormalities and how they were addressed

perform a routine system back-up and restore a nominated file from an earlier back-up

convert a document from one common file format to another and make the file available for access on a different platform (eg Macintosh application to MS-Windows application via suitably encoded Internet email attachment)

research and report availability of upgrades and support for TWO pieces of hardware and TWO pieces of software currently in use.

Note: If a specific volume or frequency is not stated, then evidence must be provided at least once.

To complete the unit requirements safely and effectively, the individual must:

Work health and safety (WHS) requirements for terminal operators

describe correct positioning of the keyboard, mouse and screen to avoid fatigue

explain when a foot rest is appropriate

Computing technology

describe relationships between baud rate, bits per second and bandwidth

explain the meaning of MIPPS

describe the function of the video card

specify what must be checked before commencement of a software installation or upgrade

Security and storage of data

identify risks that might exist for the system, the enterprise and users if an individual proceeds to install their own software (assuming the software has been scanned for viruses)

describe back-up and restoration procedures currently used, as well as their strengths and weaknesses

explain why hand-written records are kept

describe how to identify and respond to a possible security breach or virus attack

list environmental factors that could cause data loss from removable media

File preparation, conversion and encoding including cross-platform considerations

describe how to retain fonts of converted files

explain differences in file naming conventions between IBM-PC, Macintosh and Unix

list three encoding methods for internet email transmission of files and state which platform each is used for

list four common graphics file formats and when each format should be chosen

Correct use of network and telecommunications technologies

explain how a Macintosh can communicate with another computer

identify types of cabling and network cards installed and their effect on data transmission speed

summarise how to transmit data

describe how to conduct a search for product information on the internet

identify the most efficient way to exchange files with clients or other companies

Specific hardware, peripherals and consumables for the pre-press area

list the configuration of a typical high performance pre-press computer

identify the form of computer language used to drive an image setter

describe types of removable media commonly used in the pre-press area

list pieces of hardware that require periodical cleaning

Pre-press software

specify the limiting factor of most desktop publishing pre-press software

explain where a multitasking computer operating system fits in the pre-press production process

identify appropriate software to:

scan for a virus

produce a logo

manipulate an image

set up a printer network

create a page of text

Information sources

list the machine manuals, safety and other documentation relevant to this task and outline the information included in these documents.