Topqualityworka
I Provide High quality work at a low price. You may find other documents on the Internet or this website however they don't always cover all the BTEC Criteria. This is why my work has the best standards and COVERS ALL THE CRITERIA, i go into a lot of detail from pass to distinction tasks, so you can use it as a guide/ template. Each piece of works takes around 3-4 hours and I only ask for a small contribution of your money.
- 95
- 0
- 2
Community
- Followers
- Following
425 Reviews received
90 items
BTEC IT Level 2 Unit 14- Computer systems
All tasks included up to Pass, Merit and Distinction Standards.

Very cheap bundle at a great price, any questions feel free to message me.

Thanks
- Package deal
- • 8 items •
- D2- Check a computer system for security risks using a range of software utilities • Essay
- D1- Evaluate any changes to the system • Essay
- P7- Identify potential security risks • Essay
- P6- Configure software for a given user requirement • Essay
- P5- Connect hardware safely to a computer system, testing for functionality • Essay
- And more ….
All tasks included up to Pass, Merit and Distinction Standards.

Very cheap bundle at a great price, any questions feel free to message me.

Thanks
P3- Represent how data flows around a computer system
For P3, learners must represent how data flows around a
computer system; this could be using annotated diagrams
and or flow charts. The representation must include the input,
memory, processing and output aspects of the flow of data
- Package deal
- Essay
- • 1 pages •
For P3, learners must represent how data flows around a
computer system; this could be using annotated diagrams
and or flow charts. The representation must include the input,
memory, processing and output aspects of the flow of data
P4- Specify suitable components to meet user requirements
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
- Package deal
- Essay
- • 10 pages •
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
M3- Justify that the chosen software meets a given user requirement
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
- Package deal
- Essay
- • 3 pages •
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
P5- Connect hardware safely to a computer system, testing for functionality
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
- Package deal
- Essay
- • 10 pages •
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
P6- Configure software for a given user requirement
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
- Package deal
- Essay
- • 8 pages •
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
P7- Identify potential security risks
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
- Package deal
- Essay
- • 4 pages •
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
D1- Evaluate any changes to the system
For distinction criterion D1, learners should evaluate any changes
made to the system and how this meets the needs of the end
user and the original specification of the computer system. If
learners have not made any changes, then they should evaluate
changes which could be made. The evidence could be in the form
of an audio recording of a discussion, a video diary, presentation
(which could also be videoed) or a report.
- Package deal
- Essay
- • 4 pages •
For distinction criterion D1, learners should evaluate any changes
made to the system and how this meets the needs of the end
user and the original specification of the computer system. If
learners have not made any changes, then they should evaluate
changes which could be made. The evidence could be in the form
of an audio recording of a discussion, a video diary, presentation
(which could also be videoed) or a report.
D2- Check a computer system for security risks using a range of software utilities
For distinction criterion D2, learners must provide evidence of
using a range (three or more) of software utilities to check the
security of a computer system. The computer system could be
the same system that they have been using throughout the
assessment of this unit. The evidence should include information
relating to the security check being carried out, the software
utility being used, the result of the check, issues identified if any 
www.ocr.org.uk 10
and remedial action to be taken if an...
- Package deal
- Essay
- • 5 pages •
For distinction criterion D2, learners must provide evidence of
using a range (three or more) of software utilities to check the
security of a computer system. The computer system could be
the same system that they have been using throughout the
assessment of this unit. The evidence should include information
relating to the security check being carried out, the software
utility being used, the result of the check, issues identified if any 
www.ocr.org.uk 10
and remedial action to be taken if an...
P2- Explain how two contrasting businesses are influenced by stakeholders
Why buy this work you may ask? Every task for every unit meets the BTEC Criteria which is what makes my work different. I go in-depth into every aspect and make sure the specification to achieve the desired grade is met. It makes me 3-4 Per Task so i am only asking for a small contribution. Thanks. Stakeholders and their influence
• Stakeholders:
o internal, e.g. managers, employees, owners
o external, e.g. suppliers, lenders, competitors, debtors, creditors, customers,
government agencies and...
- Essay
- • 8 pages •
Why buy this work you may ask? Every task for every unit meets the BTEC Criteria which is what makes my work different. I go in-depth into every aspect and make sure the specification to achieve the desired grade is met. It makes me 3-4 Per Task so i am only asking for a small contribution. Thanks. Stakeholders and their influence
• Stakeholders:
o internal, e.g. managers, employees, owners
o external, e.g. suppliers, lenders, competitors, debtors, creditors, customers,
government agencies and...
P2- Explain how two contrasting businesses are influenced by stakeholders
P2- Explain how two contrasting businesses are influenced by stakeholders
P1- Explain the features of two contrasting businesses
P1- Explain the features of two contrasting businesses
P1- Explain the features of two contrasting businesses