NTISthis.com

Evidence Guide: TLIK2010 - Use infotechnology devices in the workplace

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

TLIK2010 - Use infotechnology devices in the workplace

What evidence can you provide to prove your understanding of each of the following citeria?

Identify infotechnology systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Types of infotechnology equipment used in the work area are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Functions of equipment, component parts and accessories are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Applications for workplace activities of different infotechnology equipment and systems are interpreted

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Routine faults in operating systems, software applications and operator errors are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Sources of information on rectifying/reporting faults with operating equipment, systems and application are identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Access and operate computer-based equipment and systems

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Work environments and equipment are adjusted to meet ergonomic requirements and workplace policies and procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Systems are accessed and checked as required for viruses

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Equipment is set up for work requirements in accordance with workplace procedures and manufacturers guidelines

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Infotechnology equipment and software operating manuals and/or help screens are used to inform work practices

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Required application software packages and accessories are selected and accessed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Required file and/or data to be accessed is identified

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Files/data are filed in accordance with workplace procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Shut-down procedures for files, applications and equipment are followed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Input, store and present files/data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is entered using appropriate equipment, keyboard/mouse, bar code reader, touch screen or other system

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Accurate input is confirmed

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Files are accessed in accordance with workplace procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Data is manipulated to suit work requirements and is checked for accuracy

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Saved files are accessed through relevant directories

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information and disk/s are stored as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Information is presented using computerised projection facilities as required

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Implement workplace procedures for managing and securing data

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Security procedures are followed in accordance with workplace procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Precautions against the loss or corruption of data are followed in accordance with workplace procedures

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1

Identify infotechnology systems

1.1

Types of infotechnology equipment used in the work area are identified

1.2

Functions of equipment, component parts and accessories are identified

1.3

Applications for workplace activities of different infotechnology equipment and systems are interpreted

1.4

Routine faults in operating systems, software applications and operator errors are identified

1.5

Sources of information on rectifying/reporting faults with operating equipment, systems and application are identified

2

Access and operate computer-based equipment and systems

2.1

Work environments and equipment are adjusted to meet ergonomic requirements and workplace policies and procedures

2.2

Systems are accessed and checked as required for viruses

2.3

Equipment is set up for work requirements in accordance with workplace procedures and manufacturers guidelines

2.4

Infotechnology equipment and software operating manuals and/or help screens are used to inform work practices

2.5

Required application software packages and accessories are selected and accessed

2.6

Required file and/or data to be accessed is identified

2.7

Files/data are filed in accordance with workplace procedures

2.8

Shut-down procedures for files, applications and equipment are followed

3

Input, store and present files/data

3.1

Data is entered using appropriate equipment, keyboard/mouse, bar code reader, touch screen or other system

3.2

Accurate input is confirmed

3.3

Files are accessed in accordance with workplace procedures

3.4

Data is manipulated to suit work requirements and is checked for accuracy

3.5

Saved files are accessed through relevant directories

3.6

Information and disk/s are stored as required

3.7

Information is presented using computerised projection facilities as required

4

Implement workplace procedures for managing and securing data

4.1

Security procedures are followed in accordance with workplace procedures

4.2

Precautions against the loss or corruption of data are followed in accordance with workplace procedures

Required Skills and Knowledge

ELEMENTS

PERFORMANCE CRITERIA

Elements describe the essential outcomes.

Performance criteria describe the performance needed to demonstrate achievement of the element.

1

Identify infotechnology systems

1.1

Types of infotechnology equipment used in the work area are identified

1.2

Functions of equipment, component parts and accessories are identified

1.3

Applications for workplace activities of different infotechnology equipment and systems are interpreted

1.4

Routine faults in operating systems, software applications and operator errors are identified

1.5

Sources of information on rectifying/reporting faults with operating equipment, systems and application are identified

2

Access and operate computer-based equipment and systems

2.1

Work environments and equipment are adjusted to meet ergonomic requirements and workplace policies and procedures

2.2

Systems are accessed and checked as required for viruses

2.3

Equipment is set up for work requirements in accordance with workplace procedures and manufacturers guidelines

2.4

Infotechnology equipment and software operating manuals and/or help screens are used to inform work practices

2.5

Required application software packages and accessories are selected and accessed

2.6

Required file and/or data to be accessed is identified

2.7

Files/data are filed in accordance with workplace procedures

2.8

Shut-down procedures for files, applications and equipment are followed

3

Input, store and present files/data

3.1

Data is entered using appropriate equipment, keyboard/mouse, bar code reader, touch screen or other system

3.2

Accurate input is confirmed

3.3

Files are accessed in accordance with workplace procedures

3.4

Data is manipulated to suit work requirements and is checked for accuracy

3.5

Saved files are accessed through relevant directories

3.6

Information and disk/s are stored as required

3.7

Information is presented using computerised projection facilities as required

4

Implement workplace procedures for managing and securing data

4.1

Security procedures are followed in accordance with workplace procedures

4.2

Precautions against the loss or corruption of data are followed in accordance with workplace procedures

Range Statement

Range is restricted to essential operating conditions and any other variables essential to the work environment.

Non-essential conditions can be found in the Companion Volume Implementation Guide.