The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to install a desktop operating system
|
|
Determine desktop applications and feature requirements according to organisational requirements Completed |
Evidence:
|
Determine licensing, data migration, hardware and system requirements according to organisational requirements Completed |
Evidence:
|
Implement local data backups according to organisational and technical requirements Completed |
Evidence:
|
Install desktop operating system
|
|
Install and upgrade desktop operating system and applications according to task requirements Completed |
Evidence:
|
Configure and connect network settings and workstation according to task requirements Completed |
Evidence:
|
Patch operating system and applications according to task requirements Completed |
Evidence:
|
Restore local data to new workstation Completed |
Evidence:
|
Configure desktop environment
|
|
Configure required hardware devices Completed |
Evidence:
|
Administer user environment according to task requirements Completed |
Evidence:
|
Create file and directory structure according to task requirements Completed |
Evidence:
|
Configure access to external data and desktop applications according to business requirements Completed |
Evidence:
|
Operate command line interface
|
|
Open command line interface and run commands and scripts according to task requirements Completed |
Evidence:
|
Manipulate command line files according to task requirements Completed |
Evidence:
|
Configure desktop security
|
|
Modify default user security settings according to organisational policies and guidelines Completed |
Evidence:
|
Modify file and directory ownership, permissions and password security Completed |
Evidence:
|
Configure and implement security settings for desktop applications according to business requirements Completed |
Evidence:
|
Monitor and test desktop
|
|
Test desktop environment functionality and performance according to organisational requirements Completed |
Evidence:
|
Diagnose and rectify desktop operating errors according to task requirements Completed |
Evidence:
|
Document desktop environment and lodge with required personnel according to organisational policies and procedures Completed |
Evidence:
|