The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Operate an enterprise wide operating system
|
|
Modify boot options by operating an enterprise wide operating system Completed |
Evidence:
|
Shutdown a networked operating system using system commands with qualifiers Completed |
Evidence:
|
Manage files using file management commands and wildcards and creating disk partitions and other media file systems Completed |
Evidence:
|
Mount and unmount file systems using system commands Completed |
Evidence:
|
Verify the integrity of file systems using system utilities Completed |
Evidence:
|
Configure telecommunication applications by using system commands with special permission modes Completed |
Evidence:
|
Critically analyse, evaluate and apply the enterprise wide operating system features to a given telecommunications multi-user application using distributed computing Completed |
Evidence:
|
Apply system functions
|
|
Use the command line interface to interact with shells and commands to the telecommunications application on distributed computing Completed |
Evidence:
|
Manage files by applying regular expressions with system functions Completed |
Evidence:
|
Send text files and output streams through text utilities using commands Completed |
Evidence:
|
Evaluate and apply enterprise wide operating system functions to a telecommunications application on distributed computing to create menu options Completed |
Evidence:
|
Manage user login environment and customisation
|
|
Manage user and group accounts to the telecommunications application on distributed computing Completed |
Evidence:
|
Change user and group profiles to allowed security access level using commands Completed |
Evidence:
|
Scan log files for activity using commands Completed |
Evidence:
|
Configure the user environment for setting user and global profiles Completed |
Evidence:
|
Record the configuration settings Completed |
Evidence:
|
Manage system level functions
|
|
Automate scheduling using the system ‘cron’ command Completed |
Evidence:
|
Critically analyse the need for backup strategy in a telecommunications network application Completed |
Evidence:
|
Plan a backup strategy to maintain redundancy of the system Completed |
Evidence:
|
Configure the system to perform scheduled backing up the file system to various media Completed |
Evidence:
|
Verify integrity of backup operations by restoring system using backup files Completed |
Evidence:
|
Configure system log files for administration and security needs Completed |
Evidence:
|
Manage a print server and print files to provide customer service Completed |
Evidence:
|
Document the configuration backup schedules and system logs Completed |
Evidence:
|
Complete evaluation and configuration documentation
|
|
Produce a project evaluation report on the application of Unix features to a given telecommunications multi-user application using distributed computing with recommendations on improvements to the system Completed |
Evidence:
|
Produce a report on the management and configuration of user applications and system level functions Completed |
Evidence:
|