Friday, 17 October 2014

P5

                                               

Witness statement
Learner name
Megan Addy
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2.2 computer systems.
Assignment
P5 set up a standalone computer system, installing hardware and software components [SM3]

Description of activity undertaken (please be as specific as possible)
After making a successful start in your role as an IT trainer for the IT Support Department of RS Components, you have been have been asked to prepare training material of a more advanced and practical kind.
Before you are allowed to do this you are required to prove your abilities in hardware and software upgrades.

Task
Achieved
Date achieved
Connect a monitor to a computer
x

Connect a keyboard to a computer
x

Connect a mouse to a computer
x

Demonstrate where the graphics card is installed
x

Install MS Office 2003


Install MS security essentials


Create a user account


Configure system software, application software and documents





Assessment and grading criteria
P5 set up a standalone computer system, installing hardware and software components [SM3]

For P5, learners must install at least one hardware and one software component in a stand-alone system.
This is best evidenced with a witness statement or observation record and screen shots. Learners must use suitable safety equipment/tools and pay due regard to health and safety issues.

How the activity meets the requirements of the assessment and grading criteria,
including how and where the activity took place
Megan plugged in the monitor and tightened the screws to secure it. Megan then put the other cables in, for example Ethernet and checked that you could login fine.

Witness name
 Kelsey marshall
Job role





Witness signature
K.MARSHALL
Date









Assessor name






Assessor signature

Date

p6 witness statement

                                               

Witness statement
Learner name
Megan Addy
Qualification
BTEC National 1st certificate in IT
Unit number and title
Unit 2.2 computer systems.
Assignment
Set up and maintain a computer system

Description of activity undertaken (please be as specific as possible)
Task 2 (P6)
Using the computer system provided:
Change the icon size to large
Change the font size to large
colour/background to red


Assessment and grading criteria
P6.configure a computer system to meet user needs

For P6, learners must configure some basic system settings, such as left and right mouse buttons, powersaving options, screen resolution, desktop theme, font size, default language setting, default folder locations etc.

How the activity meets the requirements of the assessment and grading criteria, including how and where the activity took place
I witnessed Megan change the folder sizes from small to medium and then medium to large using the option button in the top right corner of the document folder. Megan then changed her desktop from the Kingswood home page to a photo of her and her friends, the way she did this was by finding a photo and then clicking on the right hand side of the mouse which provides an option of “set as desktop”. After this Megan then changed the icon size to large by right clicking the background, and then personalise and then it slows a option of icon size. . Finally Megan changed the font size to large, the way she did this was right clicking on the desktop and then personalisation again and then you can do it there.

Witness name
Kelsey Marshall
Job role


MB


Witness signature
K.M
Date









Assessor name






Assessor signature

Date




Monday, 6 October 2014


P3

Security,There are two main points of security in any computer system or software.Virus Protection and Fire walls.Now, firstly Virus protection. This is a device for your system that stops theft of files, and blocks harmful data from being read of you device and being corrupted. Virus protection actually contain Fire wall protection also so these two types of protection are closely knitted together, like shredded wheat. There any many different tyoes of anti virus software on the market to this day, each has different priorities of protection. Some of the bigger names are, Avast, Norton 360 and kaspersky, these all work in similar ways to block and remove: computer viruses, computer worm, trojan horses, spyware and adware.
Firewalls These are used to block or allow network transactions based on a set of pre determined rules. Fire walls are constantly being used to block unauthorised access while allowing knows and trusted systems to pass, this is normally password protected. To totally stop this the the opperating system on you computer will sometimes prompt a site block to disable all threat to your system.

Clean up tools The removal of cookies: This is important to keep your computer moving quickly and without the risk of a spyware attack. This can allow hackers to see what you have in your online shopping cart and then find your address and collect it before you do, for example. Cleaning up your cookies can help with security and it will enable a constant browsing speed for your operating system, or just disable them entirely.Internet history: Having a clear internet history is really important. there are any files that can get stored on your system that would lead to a slower running speed, also this can be used to hide Christmas presents for a love one if you share the same computer.Defragmentation: This is used to maintain file systems that have fragmented, it does this by physically ordering the files and sorting them into the smallest number of fragments. this lowers the space needed to run the software allowing faster speeds

Drive formatting: This allows space for data to be stored, most mass storage devices need to be formatted before the can be used to store data. Any data on the device before it is formatted will be deleted, so don't be stupid and format it with important data on it.