0% found this document useful (0 votes)
199 views2 pages

Evidence Plan COC 3

This document outlines the evidence and assessment methods that will be used to evaluate a trainee's competency in setting up a computer server. The trainee must demonstrate creating user folders and configuring access levels according to network policies. They must also perform security checks, install necessary modules, configure network services, respond to unplanned issues, and prepare reports, as assessed through questioning, demonstration, third-party reports and a portfolio. Critical aspects include assembling hardware, installing operating systems and software, and testing and documenting the setup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
199 views2 pages

Evidence Plan COC 3

This document outlines the evidence and assessment methods that will be used to evaluate a trainee's competency in setting up a computer server. The trainee must demonstrate creating user folders and configuring access levels according to network policies. They must also perform security checks, install necessary modules, configure network services, respond to unplanned issues, and prepare reports, as assessed through questioning, demonstration, third-party reports and a portfolio. Critical aspects include assembling hardware, installing operating systems and software, and testing and documenting the setup.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Evidence Plan

Competency Standards: Computer Systems and Servicing

Unit of Competency: Set-up Computer Server


Ways in which evidence will be collected:

Third Party Report


Portfolio
QuestioningDemonstration &

Written
QuestioningObservation and
(tick the column)

The evidence must show that the trainee….

 User folder is created in accordance with network


operating system (NOS) features.
 User access level is configured based on NOS features
and established network access policies/end-user
requirements.
 Security check is performed in accordance with
established network access policies/end-user
requirements.
 Normal functions of server are checked in accordance with
manufacturer’s instructions
 Required modules /add-ons are installed/updated based on
NOS installation procedures
 Network services to be configured are confirmed based on
user/system requirements
 Operation of network services are checked based on
user/system requirements
 Unplanned events or conditions are responded to in
accordance with established procedures

 Pre-deployment procedures is undertaken based on


enterprise policies and procedures

 Operation and security check are undertaken based on end-


user requirements
 Reports are prepared and completed according to enterprise
policies and procedures.
 * Assembled Computer Hardware
 * Installed operating system and drivers for
peripherals/devices
 * Installed application software
 * Conducted testing and documentation

NOTE: * Critical Aspects of Competency

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy