The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to install a desktop operating system
|
|
Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures Completed |
Evidence:
|
Obtain desktop applications and features from appropriate person Completed |
Evidence:
|
Review required installation options and file systems Completed |
Evidence:
|
Determine and apply knowledge of licensing, hardware and system requirements Completed |
Evidence:
|
Analyse data migration requirements Completed |
Evidence:
|
Backup local data in preparation for installation Completed |
Evidence:
|
Arrange access to site and advise client of deployment and potential down times Completed |
Evidence:
|
Install desktop operating system
|
|
Install or upgrade desktop operating system using appropriate installation or update method Completed |
Evidence:
|
Install desktop applications according to identified requirements Completed |
Evidence:
|
Configure network settings to connect workstation to network Completed |
Evidence:
|
Patch the operating system and applications to ensure maximum security and reliability Completed |
Evidence:
|
Restore local data to new workstation Completed |
Evidence:
|
Configure desktop environment
|
|
Configure hardware devices Completed |
Evidence:
|
Administer user environment Completed |
Evidence:
|
Create file and directory structure using appropriate administration and system tools Completed |
Evidence:
|
Configure access to external data Completed |
Evidence:
|
Configure desktop applications according to business requirements Completed |
Evidence:
|
Operate command line interface
|
|
Open a command line interface Completed |
Evidence:
|
Run commands and scripts from the command line interface Completed |
Evidence:
|
Manipulate files using the command line Completed |
Evidence:
|
Configure desktop security
|
|
Modify default user settings to ensure that they match organisational security policies Completed |
Evidence:
|
Modify file and directory ownership and permissions to ensure data security requirements are met Completed |
Evidence:
|
Ensure password security Completed |
Evidence:
|
Check appropriate legal notices are displayed at logon Completed |
Evidence:
|
Implement security options for network protocols Completed |
Evidence:
|
Configure security settings for desktop applications according to business requirements Completed |
Evidence:
|
Monitor and test the desktop
|
|
Test desktop environment to ensure that client, functionality and performance requirements have been met Completed |
Evidence:
|
Analyse and respond to diagnostic information Completed |
Evidence:
|
Use troubleshooting tools and techniques to diagnose and correct desktop problems Completed |
Evidence:
|
Document the desktop environment, according to organisational policy Completed |
Evidence:
|