NTISthis.com

Evidence Guide: UEENEED112A - Support computer hardware and software for engineering applications

Student: __________________________________________________

Signature: _________________________________________________

Tips for gathering evidence to demonstrate your skills

The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!

From the Wiki University

 

UEENEED112A - Support computer hardware and software for engineering applications

What evidence can you provide to prove your understanding of each of the following citeria?

Prepare to upgrade and maintain computer hardware and software.

  1. OHS procedures for a given work area are identified, obtained and understood.
  2. Established OHS risk control measures and procedures are followed in preparation for the work.
  3. Appropriate person(s) are consulted to determine the nature of computer or peripheral hardware/software upgrading or maintenance.
  4. Appropriate personnel are consulted to ensure the work is co-ordinated effectively with others affected by the work.
  5. Hardware subsystems needed to upgrade or maintain computers and peripherals are obtained in accordance with established procedures and checked against job requirements. (See Note 1)
  6. Software versions are deployed in accordance with established procedures and checked against job requirements. (See Note 2)
OHS procedures for a given work area are identified, obtained and understood.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Established OHS risk control measures and procedures are followed in preparation for the work.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate person(s) are consulted to determine the nature of computer or peripheral hardware/software upgrading or maintenance.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Appropriate personnel are consulted to ensure the work is co-ordinated effectively with others affected by the work.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Hardware subsystems needed to upgrade or maintain computers and peripherals are obtained in accordance with established procedures and checked against job requirements. (See Note 1)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Software versions are deployed in accordance with established procedures and checked against job requirements. (See Note 2)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Upgrade computer hardware and software.

  1. OHS risk control measures and procedures for carrying out the work are followed.
  2. Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.
  3. Computers and peripherals are dismantled as needed for upgrading in accordance with service manual instructions or industry practices, and parts stored to prevent loss or damage.
  4. Upgrading components are fitted and computer/peripheral apparatus is reassembled in accordance with service manual instructions or industry practices.
  5. Upgrading software components are installed and accordance with service manual instructions or industry practices.
  6. Operating system, including device drivers and application software are tested in preparation for return to service/customer. (See Note 3)
  7. Computer/peripheral apparatus is tested and prepared for return to customer.
OHS risk control measures and procedures for carrying out the work are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computers and peripherals are dismantled as needed for upgrading in accordance with service manual instructions or industry practices, and parts stored to prevent loss or damage.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Upgrading components are fitted and computer/peripheral apparatus is reassembled in accordance with service manual instructions or industry practices.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Upgrading software components are installed and accordance with service manual instructions or industry practices.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Operating system, including device drivers and application software are tested in preparation for return to service/customer. (See Note 3)

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computer/peripheral apparatus is tested and prepared for return to customer.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintain operation of computer hardware and software.

  1. OHS risk control measures and procedures for carrying out the work are followed.
  2. The need to test or measure live is determined in strict accordance with OHS requirements and when necessary conducted within established safety procedures.
  3. Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.
  4. Computers and peripherals are dismantled as needed to find and rectify faults in accordance with service manual instructions and industry practices, and parts stored to prevent loss or damage.
  5. Faults are identified using logical techniques drawing on knowledge of computer/peripheral hardware components and measured values of operating parameters.
  6. Faulty components are rechecked and their fault status confirmed.
  7. Operating system malfunctions are identified using logical techniques drawing on knowledge of operating system configuration requirements.
  8. Device driver malfunctions are identified using logical techniques drawing on knowledge of device driver software configuration requirements.
  9. Application software malfunctions are identified using logical techniques drawing on knowledge of software configuration requirements.
  10. Malfunctions are rectified using latest software versions, incremental updates and bug and security patches.
  11. Computer hardware/peripheral device, operating system, including device drivers, and application software are tested in preparation for return to service/customer.
  12. Redundant files are removed and disposed of or archived in accordance with established procedures.
  13. Methods for dealing with unexpected situations are selected on the basis of safety and specified work outcomes.
  14. Maintenance is carried out efficiently without waste of materials and energy or damage to apparatus, the surrounding environment or other services.
OHS risk control measures and procedures for carrying out the work are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

The need to test or measure live is determined in strict accordance with OHS requirements and when necessary conducted within established safety procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computers are checked as being isolated where necessary in strict accordance OHS requirements and procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computers and peripherals are dismantled as needed to find and rectify faults in accordance with service manual instructions and industry practices, and parts stored to prevent loss or damage.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Faults are identified using logical techniques drawing on knowledge of computer/peripheral hardware components and measured values of operating parameters.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Faulty components are rechecked and their fault status confirmed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Operating system malfunctions are identified using logical techniques drawing on knowledge of operating system configuration requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Device driver malfunctions are identified using logical techniques drawing on knowledge of device driver software configuration requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Application software malfunctions are identified using logical techniques drawing on knowledge of software configuration requirements.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Malfunctions are rectified using latest software versions, incremental updates and bug and security patches.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Computer hardware/peripheral device, operating system, including device drivers, and application software are tested in preparation for return to service/customer.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Redundant files are removed and disposed of or archived in accordance with established procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Methods for dealing with unexpected situations are selected on the basis of safety and specified work outcomes.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Maintenance is carried out efficiently without waste of materials and energy or damage to apparatus, the surrounding environment or other services.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Complete and report upgrading and maintenance activities.

  1. OHS work completion risk control measures and procedures are followed.
  2. Work area is cleaned and made safe in accordance with established procedures.
  3. Written justification is produced for hardware software upgrading and maintenance.
  4. Upgrading and maintenance is documented and appropriate person(s) notified in accordance with established procedures.
OHS work completion risk control measures and procedures are followed.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Work area is cleaned and made safe in accordance with established procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Written justification is produced for hardware software upgrading and maintenance.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Upgrading and maintenance is documented and appropriate person(s) notified in accordance with established procedures.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Note:

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Example of materials are motherboards, processors and memory modules.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Example include complete version update, incremental (download) updates and security and bug patches.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Examples include Internet access, word processing, spreadsheet, graphics, publishing and industrial applications.

Completed
Date:

Teacher:
Evidence:

 

 

 

 

 

 

 

Assessed

Teacher: ___________________________________ Date: _________

Signature: ________________________________________________

Comments:

 

 

 

 

 

 

 

 

Instructions to Assessors

Evidence Guide

9) This provides essential advice for assessment of the unit and must be read in conjunction with the performance criteria and the range statement of the unit and the Training Package Assessment Guidelines.

The Evidence Guide forms an integral part of this unit. It must be used in conjunction with all parts of this unit and performed in accordance with the Assessment Guidelines of this Training Package.

Overview of Assessment

9.1)

Longitudinal competency development approaches to assessment, such as Profiling, require data to be reliably gathered in a form that can be consistently interpreted over time. This approach is best utilised in Apprenticeship programs and reduces assessment intervention. It is the industry-preferred model for apprenticeships. However, where summative (or final) assessment is used it is to include the application of the competency in the normal work environment or, at a minimum, the application of the competency in a realistically simulated work environment. It is recognised that, in some circumstances, assessment in part or full can occur outside the workplace. However, it must be in accordance with industry and regulatory policy.

Methods chosen for a particular assessment will be influenced by various factors. These include the extent of the assessment, the most effective locations for the assessment activities to take place, access to physical resources, additional safety measures that may be required and the critical nature of the competencies being assessed.

The critical safety nature of working with electricity, electrical equipment, gas or any other hazardous substance/material carries risk in deeming a person competent. Sources of evidence need to be ‘rich’ in nature to minimise error in judgment.

Activities associated with normal everyday work have a bearing on the decision as to how much and how detailed the data gathered will contribute to its ‘richness’. Some skills are more critical to safety and operational requirements while the same skills may be more or less frequently practised. These points are raised for the assessors to consider when choosing an assessment method and developing assessment instruments. Sample assessment instruments are included for Assessors in the Assessment Guidelines of this Training Package.

Critical aspects of evidence required to demonstrate competency in this unit

9.2)

Before the critical aspects of evidence are considered all prerequisites shall be met.

Evidence for competence in this unit shall be considered holistically. Each element and associated performance criteria shall be demonstrated on at least two occasions in accordance with the ‘Assessment Guidelines – UEE11’. Evidence shall also comprise:

A representative body of work performance demonstrated within the timeframes typically expected of the discipline, work function and industrial environment. In particular this shall incorporate evidence that shows a candidate is able to:

Implement Occupational Health and Safety workplace procedures and practices, including the use of risk control measures as specified in the performance criteria and range statement

Apply sustainable energy principles and practices as specified in the performance criteria and range statement

Demonstrate an understanding of the essential knowledge and associated skills as described in this unit. It may be required by some jurisdictions that RTOs provide a percentile graded result for the purpose of regulatory or licensing requirements.

Demonstrate an appropriate level of skills enabling employment

Conduct work observing the relevant Anti Discrimination legislation, regulations, polices and workplace procedures

Demonstrated consistent performance across a representative range of contexts from the prescribed items below:

Support computer hardware and software as described in 8) and including:

Upgrade a computer including:

A

Obtaining appropriate upgrading subsystems

B

Dismantling, fitting upgrading subsystems and reassembling correctly

C

Testing upgrade

D

Documenting upgrading activities

Install and upgrade computer software on at least two occasions including:

E

Identifying deployment or upgrade needs

F

Installing and configuring operating system and applications software

G

Testing upgraded software

H

Documenting upgrade activities

Maintain a computer and two external peripheral devices including:

I

Testing and identifying faulty components

J

Dismantling, fitting replacement components and reassembling correctly

K

Testing maintenance repair

L

Documenting maintenance activities

Maintain computer software on at least two occasions including:

M

Monitor and maintain the operating system and applications software

N

Configure backup and recovery options

O

Identifying operating system malfunctions

P

Identifying device driver malfunctions

Q

Identifying application malfunctions

R

Rectifying software malfunctions

S

Dealing with redundant files

T

Documenting maintenance activities

U

Dealing with unplanned events by drawing on essential knowledge and skills to provide appropriate solutions incorporated in a holistic assessment with the above listed items

Note:

Successful completion of relevant vendor training may be used to contribute to evidence on which competency is deemed. In these cases the alignment of outcomes of vendor training with performance criteria and critical aspects of evidence shall be clearly identified.

Context of and specific resources for assessment

9.3)

This unit should be assessed as it relates to normal work practice using procedures, information and resources typical of a workplace. This should include:

OHS policy and work procedures and instructions.

Suitable work environment, facilities, equipment and materials to undertake actual work as prescribed in this unit.

These should be used in the formal learning/assessment environment.

Note:

Where simulation is considered a suitable strategy for assessment, conditions for assessment must be authentic and as far as possible reproduce and replicate the workplace and be consistent with the approved industry simulation policy.

The resources used for assessment should reflect current industry practices in relation to support computers hardware and software.

Method of assessment

9.4)

This unit shall be assessed by methods given in Volume 1, Part 3 ‘Assessment Guidelines’.

Note:

Competent performance with inherent safe working practices is expected in the Industry to which this unit applies. This requires assessment in a structured environment which is primarily intended for learning/assessment and incorporates all necessary equipment and facilities for learners to develop and demonstrate the essential knowledge and skills described in this unit.

Concurrent assessment and relationship with other units

9.5)

There are no concurrent assessment recommendations for this unit.

Required Skills and Knowledge

8) This describes the essential skills and knowledge and their level, required for this unit.

Evidence shall show that knowledge has been acquired of safe working practices and supporting computers hardware and software.

All knowledge and skills detailed in this unit should be contextualised to current industry practices and technologies.

KS01-ED112A Computer peripherals and operating systems

Evidence shall show an understanding of computer peripherals and operating systems to an extent indicated by the following aspects:

T1 Types and applications of computer peripherals

T2 Operating principles of computer peripheral hardware

T3 Management of peripheral devices

T4 Operating system components and structure

T5 Operating system installation, upgrades and migration

T6 Operating system imaging and deployment

T7 Configuring hardware, device drivers, and applications

T8 Configuring network connectivity

T9 File structure and management

T10 Configuring file and folder access

T11 Authentication and authorisation

T12 Remote access

T13 Monitoring and maintaining an operating system using system tools

T14 Configuring backup and recovery options

T15 Operating system malfunctions and solutions

T16 Troubleshooting techniques

T17 Occupational health and safety fundamentals as they relate to computing device assembly/disassembly and computer operating systems.

Range Statement

10) This relates to the unit as a whole providing the range of contexts and conditions to which the performance criteria apply. It allows for different work environments and situations that will affect performance.

This unit shall be demonstrated in relation to maintaining and upgrading the operating system, including device drivers and at least three application software types for a personal computer and server.

Generic terms used throughout this Vocational Standard shall be regarded as part of the Range Statement in which competency is demonstrated. The definition of these and other terms that apply are given in Volume 2, Part 2.1.