OCR • IT - Level 2
Latest uploads for IT - Level 2 at OCR. Looking for IT - Level 2 notes at OCR? We have lots of notes, study guides and revision notes available for IT - Level 2 at OCR.
-
10
- 0
-
1
Modules IT - Level 2 at OCR
Notes available for the following courses of IT - Level 2 at OCR
Latest notes & summaries OCR • IT - Level 2
For P3, learners must represent how data flows around a
computer system; this could be using annotated diagrams
and or flow charts. The representation must include the input,
memory, processing and output aspects of the flow of data
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
For distinction criterion D1, learners should evaluate any changes
made to the system and how this meets the needs of the end
user and the original specification of the computer system. If
learners have not made any changes, then they should evaluate
changes which could be made. The evidence could be in the form
of an audio recording of a discussion, a video diary, presentation
(which could also be videoed) or a report.
For distinction criterion D2, learners must provide evidence of
using a range (three or more) of software utilities to check the
security of a computer system. The computer system could be
the same system that they have been using throughout the
assessment of this unit. The evidence should include information
relating to the security check being carried out, the software
utility being used, the result of the check, issues identified if any 
www.ocr.org.uk 10
and remedial action to be taken if an...