Friday, 6 June 2014

Unit 2: Task six b M2 - 2.3


Unit 2: Task five M3 & D2: 2.2




Unit 2: Task four P8: 2.2

                                               

Witness statement
Learner name
Shahnaz Chaudhury
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2.2 Computer systems
Assignment


Description of activity undertaken (please be as specific as possible)
Using the computer system provided, carry out the following routine maintenance:
• Create a file structure under user as follows
A folder labelled with your name and within this folder create 3 folders labelled Home, Work and Study
• Configure the operating system to perform the following:
• back-up procedures
• automatic scheduling and deletion of unwanted data
• archiving
• defragmentation
• deleting temporary files
• Cleaning the keyboard, mouse, display screen of the computer provided
• replacing consumables printer paper in the printer provided
• replacing the damaged mouse

Assessment and grading criteria
Task 4.
undertake routine maintenance tasks on a standalone computer
system. P8

How the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place
I witnessed Shahnaz complete all the tasks. She successfully completed cleaning the keyboard, mouse and the screen of the computer. Defragmentation of the computer was carried out successfully under my supervision along with the rest of the tasks listed above.

Witness name
Shahnaz Chaudhury
Job role
Student




Witness signature
Lauren Corrigan
Date
05/06/14








Assessor name
Phil Wilikinson





Assessor signature
P.W
Date
05/06/14

Unit 2: Task three P7: 2.2

Thursday, 8 May 2014

Unit 2: Task two P6 - 2.2

                                               

Witness statement
Learner name
Shahnaz Chaudhury
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2 computer systems.
Assignment
Set up and maintain a computer system

Description of activity undertaken (please be as specific as possible)
Task 2 (P6)
Using the computer system provided:
Change the icon size to large
Change the font size to large
colour/background to red


Assessment and grading criteria
P6.configure a computer system to meet user needs

How the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place
A stand-alone computer was set up in IV6. I witnessed Shahnaz change the icon size from small to large. Background colour was also changed along with the font size. The font size was changed to large.


Witness name
Lauren Corrigan
Job role
Student




Witness signature
L.C.
Date
08/05/14








Assessor name
Phil Wilkinson





Assessor signature
P. Wilkinson
Date
08/05/14

Friday, 21 March 2014

Unit 2: Task one P5 - 2.2

                                               

Witness statement
Learner name
Shahnaz Chaudhury
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2.2
Assignment
Set up and manage a computer system

Description of activity undertaken (please be as specific as possible)
After making a successful start in your role as an IT trainer for the IT Support Department of RS Components, you have been have been asked to prepare training material of a more advanced and practical kind.
Before you are allowed to do this you are required to prove your abilities in hardware and software upgrades.

Task
Achieved
Date achieved
Connect a monitor to a computer
Yes
Friday 21st March 2014
Connect a keyboard to a computer
Yes
Friday 21st March 2014
Connect a mouse to a computer
Yes
Friday 21st March 2014
Demonstrate where the graphics card is installed
Yes
Friday 21st March 2014
Install MS Office 2003
Yes
Friday 21st March 2014
Install MS security essentials
Yes
Friday 21st March 2014
Create a user account
Yes
Friday 21st March 2014
Configure system software, application software and documents
Yes
Friday 21st March 2014



Assessment and grading criteria
P5 set up a standalone computer system, installing hardware and software components [SM3]

For P5, learners must install at least one hardware and one software component in a stand-alone system.
This is best evidenced with a witness statement or observation record and screen shots. Learners must use suitable safety equipment/tools and pay due regard to health and safety issues.

How the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place
I witnessed Shahnaz connect the monitor, keyboard and the mouse directly to the computer. The graphics card was shown clearly as to where it was installed. Shahnaz successfully installed MS Office 2003 along with the MS security essentials and also the device driver for a printer. The following were created: User account and configuration, system software, application software and documents. This was all undertaken in IV5.

Witness name
Lauren Corrigan
Job role
 Student




Witness signature
L.C
Date
21/03/14








Assessor name
Chris Sumpter





Assessor signature
Date
21/03/14

Thursday, 20 March 2014

Unit 2: Task five D1 - 2.1




Unit 2: Task four M1 - 2.1







Unit 2: Task three - 2.1

The purpose of different software utilities.
Security virus protection
The main purpose of antivirus software is to protect the computer from getting a virus. It does this by scanning downloads and attachments for viruses and then it also runs in the background when the service user is using the internet. If a virus was to approach the program then the computer would alert the service user and give options of getting rid of it before it spreads across the computer files.


Defragmentation
The purpose of defragmentation is when a computer locates all lost files, it gathers them all and organises the files that have been fragmented -(when a file has originally been saved into the incorrect place). This is a useful device because it allows the computer database to become more organised and it increases the processing speed overall improving performance.


Drive formatting

This completely wipes the hard drive overall restoring the computer to the default settings. This is done when the computer is crashed by a virus or if the hard drive is cluttered with unnecessary files. This can also improve performance as it allows the system to run faster without risk of virus attacks.