OCR • IT - Level 2
Latest uploads for IT - Level 2 at OCR. Looking for IT - Level 2 notes at OCR? We have lots of notes, study guides and revision notes available for IT - Level 2 at OCR.
-
10
- 0
-
1
Modules IT - Level 2 at OCR
Notes available for the following courses of IT - Level 2 at OCR
Latest notes & summaries OCR • IT - Level 2
For P3, learners must represent how data flows around a computer system; this could be using annotated diagrams and or flow charts. The representation must include the input, memory, processing and output aspects of the flow of data
For P4, learners must specify the components to be used to create a computer system for a specified end user. This should include hardware components, any peripherals, software systems, application software and utilities which they would recommend. Evidence for this could be in the form of a presentation, report, video/audio discussion.
For merit criterion M3, learners must provide a justification as to why the configuration that they have carried out meets the needs of the specified end user. This could be included as a verbal justification during the video of the customisation, response to questions from the teacher, additional annotation of the screen captures, a presentation or report.
For P5, learners must provide evidence of connecting hardware to a computer system and test the functionality of the system. The learners should connect at least three hardware components, one of which should be internal to the system. The evidence could be in the form of a video, series of annotated photographs or detailed observation of the learner connecting the hardware. The learners should be demonstrating safe working practices. The learners must also include a test plan with the headings ...
For P6, learners must configure at least two pieces of software to meet the needs of a specified user. Evidence could be in the form of a video, detailed observation or annotated screen captures.
For P7, learners must identify the potential security risks that can apply to a computer system. The computer system should be the same system that they have been been configuring software on. The evidence could be presented as a recorded discussion, presentation with speaker notes (which could also be videoed) or a report.
For distinction criterion D1, learners should evaluate any changes made to the system and how this meets the needs of the end user and the original specification of the computer system. If learners have not made any changes, then they should evaluate changes which could be made. The evidence could be in the form of an audio recording of a discussion, a video diary, presentation (which could also be videoed) or a report.
For distinction criterion D2, learners must provide evidence of using a range (three or more) of software utilities to check the security of a computer system. The computer system could be the same system that they have been using throughout the assessment of this unit. The evidence should include information relating to the security check being carried out, the software utility being used, the result of the check, issues identified if any www.ocr.org.uk 10 and remedial action to be taken if an...