Unit 14 Software engineering for business

OCR

Here are the best resources to pass Unit 14 Software engineering for business. Find Unit 14 Software engineering for business study guides, notes, assignments, and much more.

All 9 results

Sort by:

P3- Represent how data flows around a computer system
  • Essay

    P3- Represent how data flows around a computer system

  • For P3, learners must represent how data flows around a computer system; this could be using annotated diagrams and or flow charts. The representation must include the input, memory, processing and output aspects of the flow of data
  • topqualityworka
    £3.49 More Info
P4- Specify suitable components to meet user requirements
  • Essay

    P4- Specify suitable components to meet user requirements

  • For P4, learners must specify the components to be used to create a computer system for a specified end user. This should include hardware components, any peripherals, software systems, application software and utilities which they would recommend. Evidence for this could be in the form of a presentation, report, video/audio discussion.
  • topqualityworka
    £3.49 More Info
M3- Justify that the chosen software meets a given user requirement
  • Essay

    M3- Justify that the chosen software meets a given user requirement

  • For merit criterion M3, learners must provide a justification as to why the configuration that they have carried out meets the needs of the specified end user. This could be included as a verbal justification during the video of the customisation, response to questions from the teacher, additional annotation of the screen captures, a presentation or report.
  • topqualityworka
    £3.49 More Info
P5- Connect hardware safely to a computer system, testing for functionality
  • Essay

    P5- Connect hardware safely to a computer system, testing for functionality

  • For P5, learners must provide evidence of connecting hardware to a computer system and test the functionality of the system. The learners should connect at least three hardware components, one of which should be internal to the system. The evidence could be in the form of a video, series of annotated photographs or detailed observation of the learner connecting the hardware. The learners should be demonstrating safe working practices. The learners must also include a test plan with the headings ...
  • topqualityworka
    £3.49 More Info
P6- Configure software for a given user requirement
  • Essay

    P6- Configure software for a given user requirement

  • For P6, learners must configure at least two pieces of software to meet the needs of a specified user. Evidence could be in the form of a video, detailed observation or annotated screen captures.
  • topqualityworka
    £3.49 More Info
P7- Identify potential security risks
  • Essay

    P7- Identify potential security risks

  • For P7, learners must identify the potential security risks that can apply to a computer system. The computer system should be the same system that they have been been configuring software on. The evidence could be presented as a recorded discussion, presentation with speaker notes (which could also be videoed) or a report.
  • topqualityworka
    £3.49 More Info
D1- Evaluate any changes to the system
  • Essay

    D1- Evaluate any changes to the system

  • For distinction criterion D1, learners should evaluate any changes made to the system and how this meets the needs of the end user and the original specification of the computer system. If learners have not made any changes, then they should evaluate changes which could be made. The evidence could be in the form of an audio recording of a discussion, a video diary, presentation (which could also be videoed) or a report.
  • topqualityworka
    £3.49 More Info
D2- Check a computer system for security risks using a range of software utilities
  • Essay

    D2- Check a computer system for security risks using a range of software utilities

  • For distinction criterion D2, learners must provide evidence of using a range (three or more) of software utilities to check the security of a computer system. The computer system could be the same system that they have been using throughout the assessment of this unit. The evidence should include information relating to the security check being carried out, the software utility being used, the result of the check, issues identified if any www.ocr.org.uk 10 and remedial action to be taken if an...
  • topqualityworka
    £3.49 More Info
Fear of missing out? Then don’t!
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for £15 each. Every. Single. Day.