Witness
statement
|
|||||||||||||||||||||||||||||||
|
Learner name
|
Megan
Addy
|
||||||||||||||||||||||||||||||
|
Qualification
|
BTEC
National 1st certificate in IT
|
||||||||||||||||||||||||||||||
|
Unit number and title
|
Unit
2.2 computer systems.
|
||||||||||||||||||||||||||||||
|
Assignment
|
P5 set up a
standalone computer system, installing hardware and software components [SM3]
|
||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||
|
Description
of activity undertaken (please be as specific as possible)
|
|||||||||||||||||||||||||||||||
|
After
making a successful start in your role as an IT trainer for the IT Support
Department of RS Components, you have been have been asked to prepare
training material of a more advanced and practical kind.
Before
you are allowed to do this you are required to prove your abilities in
hardware and software upgrades.
|
|||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||
|
Assessment
and grading criteria
|
|||||||||||||||||||||||||||||||
|
P5 set up a
standalone computer system, installing hardware and software components [SM3]
For
P5, learners must install at least
one hardware and one software component in a stand-alone system.
This
is best evidenced with a witness statement or observation record and screen
shots. Learners must use suitable safety equipment/tools and pay due regard
to health and safety issues.
|
|||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||
|
How
the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place |
|||||||||||||||||||||||||||||||
|
Megan plugged in the monitor and
tightened the screws to secure it. Megan then put the other cables in, for
example Ethernet and checked that you could login fine.
|
|||||||||||||||||||||||||||||||
|
|
|||||||||||||||||||||||||||||||
|
Witness
name
|
Kelsey marshall
|
Job
role
|
|
||||||||||||||||||||||||||||
|
|
|
|
|
||||||||||||||||||||||||||||
|
Witness
signature
|
K.MARSHALL
|
Date
|
|
||||||||||||||||||||||||||||
|
|
|
|
|
||||||||||||||||||||||||||||
|
|
|
|
|
||||||||||||||||||||||||||||
|
Assessor
name
|
|
||||||||||||||||||||||||||||||
|
|
|
|
|
||||||||||||||||||||||||||||
|
Assessor
signature
|
|
Date
|
|
||||||||||||||||||||||||||||
Friday, 17 October 2014
P5
p6 witness statement
Witness
statement
|
||||
|
Learner name
|
Megan Addy
|
|||
|
Qualification
|
BTEC
National 1st certificate in IT
|
|||
|
Unit
number and title
|
Unit 2.2
computer systems.
|
|||
|
Assignment
|
Set up and
maintain a computer system
|
|||
|
|
||||
|
Description
of activity undertaken (please be as specific as possible)
|
||||
|
Task 2 (P6)
Using the computer system provided:
Change the icon size to large
Change the font size to large
colour/background to red
|
||||
|
|
||||
|
Assessment
and grading criteria
|
||||
|
P6.configure a computer system to meet user needs
For P6, learners must configure some basic system settings, such as
left and right mouse buttons, powersaving options, screen resolution, desktop
theme, font size, default language setting, default folder locations etc.
|
||||
|
|
||||
|
How the
activity meets the requirements of the assessment and grading criteria, including
how and where the activity took place
|
||||
|
I
witnessed Megan change the folder sizes from small to medium and then medium
to large using the option button in the top right corner of the document
folder. Megan then changed her desktop from the Kingswood home page to a
photo of her and her friends, the way she did this was by finding a photo and
then clicking on the right hand side of the mouse which provides an option of
“set as desktop”. After this Megan then changed the icon size to large by
right clicking the background, and then personalise and then it slows a
option of icon size. . Finally Megan changed the font size to large, the way
she did this was right clicking on the desktop and then personalisation again
and then you can do it there.
|
||||
|
|
||||
|
Witness name
|
Kelsey Marshall
|
Job role
|
|
|
|
|
MB
|
|
|
|
|
Witness
signature
|
K.M
|
Date
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Assessor
name
|
|
|||
|
|
|
|
|
|
|
Assessor
signature
|
|
Date
|
|
|
Tuesday, 14 October 2014
Tuesday, 7 October 2014
Monday, 6 October 2014
P3
Security,There are two main points of security in any computer system or software.Virus Protection and Fire walls.Now, firstly Virus protection. This is a device for your system that stops theft of files, and blocks harmful data from being read of you device and being corrupted. Virus protection actually contain Fire wall protection also so these two types of protection are closely knitted together, like shredded wheat. There any many different tyoes of anti virus software on the market to this day, each has different priorities of protection. Some of the bigger names are, Avast, Norton 360 and kaspersky, these all work in similar ways to block and remove: computer viruses, computer worm, trojan horses, spyware and adware.
Firewalls These are used to block or allow network transactions based on a set of pre determined rules. Fire walls are constantly being used to block unauthorised access while allowing knows and trusted systems to pass, this is normally password protected. To totally stop this the the opperating system on you computer will sometimes prompt a site block to disable all threat to your system.
Clean up tools The removal of cookies: This is important to keep your computer moving quickly and without the risk of a spyware attack. This can allow hackers to see what you have in your online shopping cart and then find your address and collect it before you do, for example. Cleaning up your cookies can help with security and it will enable a constant browsing speed for your operating system, or just disable them entirely.Internet history: Having a clear internet history is really important. there are any files that can get stored on your system that would lead to a slower running speed, also this can be used to hide Christmas presents for a love one if you share the same computer.Defragmentation: This is used to maintain file systems that have fragmented, it does this by physically ordering the files and sorting them into the smallest number of fragments. this lowers the space needed to run the software allowing faster speeds
Drive formatting: This allows space for data to be stored, most mass storage devices need to be formatted before the can be used to store data. Any data on the device before it is formatted will be deleted, so don't be stupid and format it with important data on it.
Firewalls These are used to block or allow network transactions based on a set of pre determined rules. Fire walls are constantly being used to block unauthorised access while allowing knows and trusted systems to pass, this is normally password protected. To totally stop this the the opperating system on you computer will sometimes prompt a site block to disable all threat to your system.
Clean up tools The removal of cookies: This is important to keep your computer moving quickly and without the risk of a spyware attack. This can allow hackers to see what you have in your online shopping cart and then find your address and collect it before you do, for example. Cleaning up your cookies can help with security and it will enable a constant browsing speed for your operating system, or just disable them entirely.Internet history: Having a clear internet history is really important. there are any files that can get stored on your system that would lead to a slower running speed, also this can be used to hide Christmas presents for a love one if you share the same computer.Defragmentation: This is used to maintain file systems that have fragmented, it does this by physically ordering the files and sorting them into the smallest number of fragments. this lowers the space needed to run the software allowing faster speeds
Drive formatting: This allows space for data to be stored, most mass storage devices need to be formatted before the can be used to store data. Any data on the device before it is formatted will be deleted, so don't be stupid and format it with important data on it.
Subscribe to:
Comments (Atom)
