NTISthis.com

Evidence Guide: ICTITU7106B - Manage automated ICT system applications using unix

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

ICTITU7106B - Manage automated ICT system applications using unix

What evidence can you provide to prove your understanding of each of the following citeria?

Operate a Unix based system

  1. Modify boot options by operating a Unix system
  2. Shutdown a Unix system using system commands with qualifiers
  3. Manage files using file management commands and wildcards and creating disk partitions and other media file systems
  4. Mount and unmount file systems using system commands
  5. Verify the integrity of file systems using system utilities
  6. Configure telecommunication applications by using system commands with special permission modes
  7. Analyse, evaluate and apply Unix features to a given telecommunications multi-user application using distributed computing
Modify boot options by operating a Unix system

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Shutdown a Unix system using system commands with qualifiers

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage files using file management commands and wildcards and creating disk partitions and other media file systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Mount and unmount file systems using system commands

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Verify the integrity of file systems using system utilities

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure telecommunication applications by using system commands with special permission modes

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse, evaluate and apply Unix features to a given telecommunications multi-user application using distributed computing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Apply system functions

  1. Use the command line interface to interact with shells and commands to the telecommunications application on distributed computing
  2. Manage files by applying regular expressions with system functions
  3. Send text files and output streams through text utilities using commands
  4. Evaluate and apply Unix system functions to a telecommunications application on distributed computing to create menu options
Use the command line interface to interact with shells and commands to the telecommunications application on distributed computing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage files by applying regular expressions with system functions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Send text files and output streams through text utilities using commands

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Evaluate and apply Unix system functions to a telecommunications application on distributed computing to create menu options

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage user login environment and customisation

  1. Manage user and group accounts to the telecommunications application on distributed computing
  2. Change user and group profiles to allowed security access level using commands
  3. Scan log files for activity using commands
  4. Configure the user environment for setting user and global profiles
  5. Record the configuration settings
Manage user and group accounts to the telecommunications application on distributed computing

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Change user and group profiles to allowed security access level using commands

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Scan log files for activity using commands

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the user environment for setting user and global profiles

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Record the configuration settings

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage system level functions

  1. Automate scheduling using the system ‘cron’ command
  2. Analyse the need for backup strategy in a telecommunications network application
  3. Plan a backup strategy to maintain redundancy of the system
  4. Configure the system to perform scheduled backing up the file system to various media
  5. Verify integrity of backup operations by restoring system using backup files
  6. Configure system log files for administration and security needs
  7. Manage a print server and print files to provide customer service
  8. Document the configuration backup schedules and system logs
Automate scheduling using the system ‘cron’ command

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Analyse the need for backup strategy in a telecommunications network application

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Plan a backup strategy to maintain redundancy of the system

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure the system to perform scheduled backing up the file system to various media

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Verify integrity of backup operations by restoring system using backup files

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Configure system log files for administration and security needs

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Manage a print server and print files to provide customer service

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Document the configuration backup schedules and system logs

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete evaluation and configuration documentation

  1. Produce a project evaluation report on the application of Unix features to a given telecommunications multi-user application using distributed computing with recommendations on improvements to the system
  2. Produce a report on the management and configuration of user applications and system level functions
Produce a project evaluation report on the application of Unix features to a given telecommunications multi-user application using distributed computing with recommendations on improvements to the system

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Produce a report on the management and configuration of user applications and system level functions

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

The evidence guide provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge, range statement and the Assessment Guidelines for the Training Package.

Overview of assessment

Critical aspects for assessment and evidence required to demonstrate competency in this unit

Evidence of the ability to:

use Unix operating system to manage ICT system functions

analyse system functions based on data

produce a report on the system with recommendations for improvement.

Context of and specific resources for assessment

Assessment must ensure:

a telecommunications operations site with Unix based system to manage automated functions.

Method of assessment

A range of assessment methods should be used to assess practical skills and knowledge. The following examples are appropriate for this unit:

oral or written questioning to assess required knowledge

review of evaluation and configuration reports

direct observation of the candidate performing operational procedures on a Unix based system to manage telecommunications network functions.

Guidance information for assessment

Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended, for example:

ICTPMG7145B Undertake a telecommunications project

ICTPMG8143B Manage a telecommunications project.

Aboriginal people and other people from a non-English speaking background may have second language issues.

Access must be provided to appropriate learning and assessment support when required.

Assessment processes and techniques must be culturally appropriate, and appropriate to the oral communication skill level, and language and literacy capacity of the candidate and the work being performed.

In all cases where practical assessment is used it will be combined with targeted questioning to assess required knowledge. Questioning techniques should not require language, literacy and numeracy skills beyond those required in this unit of competency.

Where applicable, physical resources should include equipment modified for people with special needs.

Required Skills and Knowledge

Required skills

communication skills to:

present technical information

liaise with customers and internal team members

literacy skills to prepare reports

planning and organising skills to direct and manage own work

problem solving skills to address operational issues

research skills to gather data and information from ICT systems

technical skills to use automated systems in distributed computing.

Required knowledge

automated systems

communication systems

distributed computing

encoding and programming techniques

network security

networking of infrastructure

realisation of software simulation

Unix commands.

Range Statement

The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.

Qualifiers may refer to:

current applications

notifications to users on future applications.

System utilities may include:

df

du

fsck.

Telecommunication applications may include:

directories and network files

network mountable file systems

set permissions on files.

Permission modes may include:

sticky bit

suid.

Regular expressions may include:

grep

sed.

Text utilities may include:

cut

expand

fmt

head

join

nl

paste

pr

sed

sort

split.

Profiles may include:

addresses

level of user login

passwords

type of user login.