![]()
Witness statement
|
|||||||||||||||||||||||||||||||
Learner name
|
Rosey Sellars
|
||||||||||||||||||||||||||||||
Qualification
|
BTEC National 1st
certificate in IT
|
||||||||||||||||||||||||||||||
Unit number
and title
|
Unit 2.2
|
||||||||||||||||||||||||||||||
Assignment
|
Set up and manage a computer system
|
||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
Description of activity undertaken
(please be as specific as possible)
|
|||||||||||||||||||||||||||||||
After making a successful
start in your role as an IT trainer for the IT Support Department of RS
Components, you have been have been asked to prepare training material of a
more advanced and practical kind.
Before you are allowed to do
this you are required to prove your abilities in hardware and software
upgrades.
|
|||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
Assessment and grading
criteria
|
|||||||||||||||||||||||||||||||
P5 set up a standalone computer system, installing
hardware and software components [SM3]
For P5, learners must install at least one hardware and one software
component in a stand-alone system.
This is best evidenced
with a witness statement or observation record and screen shots. Learners
must use suitable safety equipment/tools and pay due regard to health and
safety issues.
|
|||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
How the activity meets the
requirements of the assessment and grading criteria,
including how and where the activity took place |
|||||||||||||||||||||||||||||||
Rosey connected the monitor
to the computer, as well as the keyboard and mouse by simply looking at the
appropriate ports to plug the peripherals in. Rosey was able to show other
students in the group where the graphics card is installed. Rosey then moved
onto the laptop in the room and installed MS Office 2003 by opening the setup
file, as well as the security essentials. A user account was already present
on the computer, however Rosey displayed a good knowledge of how to complete
this task, and managed to configure the system software herself.
|
|||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||
Witness name
|
Callum James
|
Job role
|
Student
|
||||||||||||||||||||||||||||
|
|
|
|
||||||||||||||||||||||||||||
Witness signature
|
C
James
|
Date
|
14/05/14
|
||||||||||||||||||||||||||||
|
|
|
|
||||||||||||||||||||||||||||
|
|
|
|
||||||||||||||||||||||||||||
Assessor name
|
Chris Sumpter
|
||||||||||||||||||||||||||||||
|
|
|
|
||||||||||||||||||||||||||||
Assessor signature
|
![]() |
Date
|
14/05/14
|
||||||||||||||||||||||||||||
Wednesday, 14 May 2014
Unit 2.2: Task 1 P5
Wednesday, 7 May 2014
Friday, 2 May 2014
Wednesday, 2 April 2014
Wednesday, 26 March 2014
Unit 2.1: Task 2 P2
Task 2 P2:
An operating
system is a low level piece of software that helps to support the basic
functions of a computer. It is an essential component in the system software in
a computer system. This system communicates with the hardware to allow other
programmes to run. Examples of common desktop operating systems are Windows,
Mac and Linux.
Machine and Peripheral
management: On computers you can control and alter your computer. In the
control panel you can add devices e.g. cameras etc. and it is here that you
will download the software to do this. You can also control volume, and brightness
etc. for the computer itself, it’s basically the hub where all the controls for
the computer lie.


Security: The purpose of security operating systems is
to protect all the data and information stored on the computer. Security mechanisms prevent unauthorized access to the computer, so if
the computer picks up a virus from a particular website, the security operating
systems kick in and remove this virus before any files are affected. This kind
of operating system is extremely useful as virus’s can be a big problem for
computers.

File
Management: This function of the operating system
involves handling the file system which consists of two parts—a set of files,
and a directory structure. The set of files are saved on a secondary storage.
These files have a name, location, size, type, time and date of creation. These
files can be accessed either sequentially or directly. The directory structure
provides information about the files stored on the secondary storage. So
information is known about what the files contain. Directory contains the name, location, size,
and type of all the files defined on the device.

Device
Drivers: Device drivers in an operating system are things such as cameras,
phones or other pieces of technology that you connect to the computer. In most
cases with technology such as phones, a piece of software has to be downloaded
in order to use that device on the computer. But once the software is downloaded
you can connect the device to the computer at any time. So this means that you
can transfer things such as music and pictures. 

Thursday, 20 March 2014
Wednesday, 12 March 2014
Subscribe to:
Posts (Atom)