Level 5 Diploma in Computing Qualification Specification
Level 5 Diploma in Computing Qualification Specification
Page 2 of 49
CONTENTS
1.
2.
3.
Administration.............................................................................................................................. 8
4.1
4.2
4.3
4.4
4.5
4.6
5.
Assessment Cycles............................................................................................................ 8
Language of Assessment .................................................................................................. 8
Candidates ......................................................................................................................... 8
Qualification and Unit Entry Requirements ....................................................................... 8
Candidate Entry ................................................................................................................. 8
Resits ................................................................................................................................. 9
Syllabus....................................................................................................................................... 10
5.1.
5.2.
5.3.
5.4.
5.5.
5.6.
5.7.
5.8.
6.
7.
Further Information.................................................................................................................... 40
Page 3 of 49
1.1
Regulated by Ofqual and listed on the Qualifications and Credit Framework Qualification
Number 600/3055/0. The Qualifications and Credit Framework (QCF) is a credit-based
qualifications framework, allowing candidates to take a unit-based approach to building
qualifications.
For more information see:
http://ofqual.gov.uk/qualifications-and-assessments/qualification-frameworks/
A pathway qualification for candidates who wish to complete the NCC Education degree
journey. The Level 5 Diploma in Computing is equivalent to the second year of an IT degree
in the UK university system. On successful completion, candidates will be able to complete
the final year of a degree at one of the many universities that recognise NCC Education
qualifications, or pursue a career in the IT industry.
Candidates will study a balance of academic and vocational subjects in order to provide them with
the necessary knowledge and skills to play a significant role in IT organisations.
Page 4 of 49
Network Security
and Cryptography
(15 credits)
Information
Systems Analysis
(15 credits)
Dynamic Websites
(15 credits)
Analysis, Design
and
Implementation
(15 credits)
Database Design
and Development
(15 credits)
Agile
Development
(15 credits)
Computing Project
(15 credits)
Page 5 of 49
Assessment objectives
All assessment for the qualification is intended to allow candidates to demonstrate that they have
met the relevant Learning Outcomes. Moreover NCC Educations assessment is appropriate to the
assessment criteria as stated in this specification and is regularly reviewed to ensure it remains
consistent with the specification.
3.2
Unit
Global
Examination
Local
Examination
Global
Assignment
Professional Issues in IT
75%
25%
75%
25%
75%
25%
Dynamic Websites
75%
25%
75%
25%
75%
25%
Agile Development
75%
25%
Computing Project
100%
An examination is a time-constrained assessment that will take place on a specified date and
usually in an NCC Education Centre. An assignment requires candidates to produce a written
response to a set of one or more tasks, meeting a deadline imposed by the Centre. Local
Examinations and Global Assignments are marked by the Centre and Global Examinations are
marked by NCC Education.
The overall Unit mark is computed from the weighted mean of its components. The pass mark for a
Unit is 40%.
NCC Education Centres can provide candidates with a specimen assessment paper as well as a
limited number of past examination and assignment papers.
3.3
Accessibility of Assessment
We review our guidelines on assessment practices to ensure compliance with equality law and to
confirm assessment for our Units is fit for purpose.
3.3.1
Page 6 of 49
Page 7 of 49
4 Administration
4.1
Assessment Cycles
Four assessment cycles are offered throughout the year, in March, June, September and
December.
Examination dates and assignment submission deadlines are published in the NCC Education
Activity Schedule, which is provided to Centres by Customer Services. It is also available on
Connect, NCC Educations student registration system.
The Activity Schedule also gives the key dates for registering candidates for assessment cycles, the
dates when Centres can expect the assessment documentation and, ultimately, the assessment
results from NCC Education.
4.2
Language of Assessment
4.3
Candidates
NCC Educations qualifications are available to those Centre candidates who satisfy the entry
requirements as stated in this specification.
4.4
Entry Requirements
Holders of the NCC Education International Diploma in Computer Studies (IDCS)
Holders of the NCC Education Level 4 Diploma in Computing (L4DC) (QCF)
Holders of any local or international qualification deemed to be a similar level to these awards.
Candidates in this category whose first language is not English will also require IELTS 5.5 or
equivalent.
It is recommended that IDCS-holders wishing to progress to the Level 5 Diploma in Computing
should have either passed the Java or Visual Basic elective Unit, or should have some objectoriented programming experience or training before proceeding with the Level 5 qualification.
Direct Entry at Other Points
The majority of students are expected to join the NCC Education IT Journey at Level 4 or earlier.
However, applications will be accepted for entry at any point and will be accepted, by means of
documented evidence, using the following criteria:
The applicant's general educational background is appropriate for the level of entry.
The applicant's knowledge of computing is both equivalent to and appropriate for the level of
entry.
4.5
Candidate Entry
Candidates are registered for assessment via NCC Educations Connect system and according to
the deadlines for registration provided in the Activity Schedule.
Page 8 of 49
Candidates are registered for the assessment of each Unit they wish to take in a particular
assessment cycle (e.g. Units A and B in June, Units C and D in September, Units E and F in
December and Units G and H in March). This includes candidates who need to resit a particular
Unit.
Further details can be found in NCC Educations Operations Manual.
4.6
Resits
If a candidate fails an assessment, they will be provided with opportunities to resit during the
eligibility period.
Candidates may only seek reassessment in a previously failed Unit.
Page 9 of 49
5. Syllabus
5.1. Professional Issues in IT
Title:
QCF code:
Professional Issues in IT
R/503/4768
Credits
15
Level
60
Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
2. Understand
a
project
management life cycle and
associated techniques
5. Understand the principles and 5.1 Analyse an IT service case study in respect to
techniques of IT service
management requirements
management
5.2 Analyse objectives in an IT service case study
5.3 Apply management techniques to a problem
situation in order to achieve objectives
Page 10 of 49
6. Be able to design software 6.1 Define and explain the concept of software quality
quality
policies
and 6.2 Explain the use of metrics for software quality
procedures
management and apply these to a given scenario
6.3 Evaluate the requirements for software quality
policies and procedures in a problem context
6.4 Design software quality policies and procedures
and apply these to a given scenario
Syllabus content
Topic
Course coverage
Understanding IT
Standards and
Issues
Applying IT
Standards and
Issues
IT Project
Management
Applied IT Project
Management
Software Application
Deployment
Applying Software
Application
Deployment to
Projects
Page 11 of 49
IT Risk Management
What is risk?
Risk management and the techniques employed
Risk identification and analysis in IT projects
The consequences of not planning for risk
Reactive vs. proactive
Learning Outcome: 4
Applying, Evaluating
and Managing Risk
Analysis
IT Service
Management (ITSM)
Analysing and
Applying IT Service
Management
Software Quality
Policies and
Procedures
Applying Software
Quality
Page 12 of 49
Assessments
Local Examination (75%)
Global Assignment (25%)
See also Section 3 above
Page 13 of 49
Credits
15
Level
60
Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Understand the most common 1.1 Explain the most common types of cryptographic
types
of
cryptographic
algorithm (i.e. block ciphers, public-key ciphers
algorithm
and hash algorithms)
1.2 Select and justify an appropriate algorithm for a
particular purpose
2. Understand the
Infrastructure
3. Understand security protocols 3.1 Explain the concept of Web security with TLS
for
protecting
data
on 3.2 Describe Email security mechanisms
networks
3.3 Describe disk encryption mechanisms
3.4 Deploy file encryption mechanisms
4. Be able to digitally sign emails
and files
5. Understand Vulnerability
Assessments and the
weakness of using passwords
for authentication
5.1
5.2
5.3
5.4
5.5
6. Be able to perform simple 6.1 Use port scanners to highlight open ports
vulnerability assessments and 6.2 Perform password cracking using dictionary and
password audits
brute-force methods
7. Be able to configure simple
firewall architectures
8. Understand
Networks
Virtual
7.1
7.2
7.3
7.4
7.5
Page 14 of 49
Course coverage
Cryptography
Fundamentals
PKI
Web Security
Email Security
Data Protection
Vulnerability
Assessment
Authentication
Passwords
Multi-factor authentication
Biometrics
Learning Outcomes: 5
Access Control
Packet filtering
Access control lists
NAT
IDS
Learning Outcomes: 7
Firewalls
Page 15 of 49
VPN
Remote Access
Wireless Security
Page 16 of 49
Credits
15
Level
60
1. Understand soft and hard 1.1 Explain the key aspects of Soft Systems
approaches to the analysis of
Methodology (SSM) and related approaches
information systems
1.2 Explain the key aspects of Structured Systems
Analysis and Design Methodology (SSADM) and
related approaches
1.3 Identify business situations where a soft or hard
systems analysis might be appropriate
1.4 Explain combined soft/hard frameworks (such as
Multiview).
2. Understand the techniques
associated with requirements
capture
3. Understand
the
different
viewpoints associated with IS
methodologies
3.1
3.2
3.3
3.4
3.5
Page 17 of 49
Syllabus content
Topic
Course coverage
Introduction to
Information Systems
Analysis
Hard Approaches to
the Analysis of
Information Systems
Soft Approaches to
the Analysis of
Information Systems
Page 18 of 49
Combined Soft/Hard
Approaches to the
Analysis of
Information Systems
Techniques
Associated with
Requirements
Capture
Page 19 of 49
Process-Oriented IS
Methodologies
Page 20 of 49
Object-Oriented
Methodologies
IS
Analytical
Techniques for
Understanding a
Complex
Organisational
Environment
Analysis of Factors
Influencing a
Business Problem
Page 21 of 49
Principles of
Interface Design and
the Requirements
and Characteristics
of Users that
Motivate These
Design or Evaluate
an Interface with
regard to the
Requirements and
Characteristics of its
Users
Page 22 of 49
Credits
15
Level
60
Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
7. Be able to refactor an OO
programme to improve quality
Syllabus content
Topic
Course coverage
Introduction to the
Unit
Page 23 of 49
Introduction to
StarUML
Object-Oriented
Modelling
Static Modelling in
UML
Requirements gathering
Natural Language Analysis
Candidate classes
Class diagrams
Converting class diagrams into code
Learning Outcomes: 1 & 5
Dynamic Analysis
and Design
Activity diagrams
Sequence diagrams
Converting dynamic models into code
Learning Outcomes: 1 & 5
Design Patterns 1
Design Patterns 2
Model-View-Controller
Flyweight
Strategy
Facade
Learning Outcomes: 2, 3 & 4
Elements of Good
Design
Page 24 of 49
Redesign and
Implementation
Maintenance and
Refactoring
Impact of change
Refactoring
Refactoring case study
Learning Outcomes: 4 & 7
Recap
Recap of Unit
Learning Outcomes: All
Page 25 of 49
Dynamic Websites
Y/503/4786
Credits
15
Level
60
Assessment Criteria;
The Learner can:
1. Understand the various tools and 1.1 Define and explain web applications and their
techniques
used
for
Web
functions
Application development
1.2 Identify and evaluate appropriate web
application development tools for a given
scenario
1.3 Identify and evaluate appropriate web
application development techniques for a
given scenario
2. Be able to develop data-driven 2.1 Design and code a web-based user interface
websites
appropriate to a given problem
2.2 Design and build a database which interacts
with a web page
2.3 Create scripts to facilitate data transfer
between a database and a web page.
2.4 Evaluate the functionality of a databasedriven website in the context of a given
problem
3. Be able to apply the various tools 3.1 Select appropriate web development tools for
and techniques used to build dataa given scenario
driven websites
3.2 Use a development tool to develop a dynamic
web solution which addresses a given
scenario
4. Understand the functions of web 4.1 Define and explain a range of web services
services
(e.g XML, RSS, SOAP).
4.2 Evaluate and select the optimal web service
solution for a given problem
4.3 Appraise the potential business benefits of
web services
5. Be able to create and deploy web 5.1 Use one or more web services to build a
services
dynamic website which addresses a given
business problem
5.2 Evaluate a dynamic website which utilises
web services in the context of business
objectives
Page 26 of 49
Syllabus content
Topic
Course coverage
Introduction to the
Unit
Introduction to PHP
Cookies and
Sessions
Statelessness in HTTP
Cookies
Sessions
The role of PHP in web-based applications
Learning Outcomes: 1 & 2
Web Based
Protocols
XML
RSS
XHTML
CSS
Learning Outcomes: 1 & 3
Ajax (1)
Ajax (2)
Page 27 of 49
Evaluation
Standards validation
User centred design
Accessibility
Browser compatibility
Learning Outcomes: 2 & 4
Web Services
SOAP
REST
Google Directions
Mash-Ups
Learning Outcomes: 4 & 5
jQuery
Overview of jQuery
Presentational Flourishes
Selectors
Filters
Callbacks
Learning Outcomes: 1, 2 & 3
Integration
Integration of topics
Development of solution to meet a specified objective
Learning Outcomes: 3 & 5
Page 28 of 49
Credits
15
Level
60
Assessment Criteria;
The Learner can:
1. Understand
the
enterprise 1.1 Summarise the common use of distributed
application of database systems
database management systems
1.2 Explain the meaning of the term disributed
database management system
1.3 Describe the components of a disributed
database management system
1.4 Summarise the common use of data
warehouses
1.5 Explain the meaning of the term data
warehouse
1.6 Describe the structure of a data warehouse
2. Understand how to enhance the 2.1 Describe how tables that contain redundant
design of and further develop a
data can suffer from update anomalies
database system
2.2 Explain how to overcome update anomalies
using normalisation
2.3 Describe how to retrieve data from one or
more tables using SQL
3. Be able to enhance a logical 3.1 Check the tables are well-structured using
database design
normalisation
3.2 Define the integrity constraints on the tables
4. Be able to develop a physical 4.1 Map a logical database design to a physical
database design
database design
4.2 Design tables for a target DBMS
4.3 Design a representation of derived data
4.4 Design integrity constraints for the target
DBMS
4.5 Denormalise tables where appropriate
5. Be able to enhance a database 5.1 Apply integrity constraints
system using SQL
5.2 Retrieve data from one or more tables using
join
5.3 Retrieve data from one or more tables using
sub-queries
Page 29 of 49
Syllabus content
Topic
Course coverage
Key Concepts in
Databases and
Database
Management
Enhancing Design 1
Introduction to normalisation
The concept of functional dependency
Data redundancy and update anomalies
Overcoming anomalies with normalisation
Learning Outcome: 2
Enhancing Design 2
Data Retrieval 1
Data Retrieval 2
Physical Design 1
Physical Design 2
Physical Design 3
Types of constraints
Designing integrity constraints for the target DBMS
Learning Outcomes: 3, 4 & 5
Page 30 of 49
Physical Design 4
Understanding transactions
Denormalisation
Improving performance
Estimating the size of the database
Learning Outcome: 4
Distributed
Databases
Data Warehouses
Summary
The need for business intelligence and the concept of the data
warehouse
The difference between Online Transaction Processing (OLTP)
systems and data warehousing
The architecture and main components of a data warehouse
Learning Outcome: 1
Summary of Unit, linking units to objectives and to each other
Clarification of material and related issues as identified by
students
Learning Outcomes: All
Page 31 of 49
Agile Development
J/503/4783
Credits
15
Level
60
Assessment Criteria;
The Learner can:
Page 32 of 49
Syllabus content
Topic
Course coverage
An Overview of Agile
Modelling
What is a model?
Links to the 8 principles
Viewpoints for modelling
Modelling within the Agile lifecycle
Lifecycle and
Products
Project Management
Considerations
Part 1: Control Risk
Page 33 of 49
Project Management
Considerations
Part 2: Quality and
Testing
Configuration Management
Quality and Maintainability
Testing concepts
Metrics
Learning Outcomes: 1, 2 & 6
Facilitated
Workshops
Requirements
Definition and
Prioritisation
Iterative
Development and
Prototyping
What is a prototype?
What is iterative development?
Prototyping perspectives:
- Functional
- Usability
- Non-functional
- Capability/Technique prototype: Architectural Spike and
Proof of Concept
Horizontal, Vertical and Combined development strategies
Prototyping: Identify, plan, evolve, review.
Iterative development as a key technique
Learning Outcome: 6
Estimating and
Timeboxing
Page 34 of 49
Revision
Learning Outcomes: All
Page 35 of 49
Computing Project
L/503/4784
Credits
15
Level
24
Learning Outcomes;
The Learner will:
Assessment Criteria;
The Learner can:
1. Identify
a
suitable computing 1.1 Select and justify an appropriate computing
artefact and development method
artefact to develop
2. Project manage the analysis, 2.1 Select and justify the use of an appropriate
design,
development
and
development method
deployment of a computing artefact
2.2 Produce a viable project plan
2.3 Check progress against a project plan
2.4 Evaluate his/her performance against a
project plan
2.5 Select and justify the use of an appropriate
risk management approach
2.6 Select and justify the use of an appropriate
configuration management approach
3. Carry out the analysis
computing artefact
for
a 3.1
3.2
3.3
3.4
Elicit requirements
Prioritise requirements
Produce a requirements specification
Produce an analysis specification
Page 36 of 49
Syllabus content
Topic
Course coverage
Introduction
Appropriate Artefacts
Planning your Project
Appropriate Development Methods
Appropriate Risk Management
Appropriate Configuration Management
Learning Outcome: 2
Analysis
Specifications
Design Specifications
Test Scripts
Page 37 of 49
Page 38 of 49
Assessments
Global Assignment (100%)
See also Section 3 above
Page 39 of 49
7. Further Information
For more information about any of NCC Educations products please contact
[email protected] or alternatively please visit www.nccedu.com to find out more about
our suite of high-quality British qualifications.
Page 40 of 49
Examination Guidelines
Activity Schedule
Operations Manual
All documentation, together with access to NCC Educations online resources, is available to
Centres and (where applicable) candidates who have registered for assessment.
Page 41 of 49
Pass
Merit
Distinction
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand a project
management life cycle
and associated
techniques
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand how to
deploy a software
application
Demonstrate adequate
deployment of an
application
Demonstrate sound
and appropriate
deployment of an
application
Demonstrate highly
effective deployment of
an application
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand the
principles and
techniques of IT
service management
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to design
software quality
policies and
procedures
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 42 of 49
Pass
Merit
Distinction
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand the
techniques associated
with requirements
capture
Demonstrate adequate
understanding of
techniques
Demonstrate robust
understanding of
techniques
Demonstrate highly
comprehensive
understanding of
techniques
Understand the
different viewpoints
associated with IS
methodologies
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to apply
various analytical
techniques for
understanding a
complex organisational
environment
Demonstrate adequate
and appropriate
application of
techniques
Demonstrate sound
and consistently
appropriate application
of techniques
Demonstrate detailed
and highly appropriate
application of
techniques
Understand the
relationship between
the economic, social,
political and technical
factors influencing a
business problem
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Demonstrate adequate
and appropriate
application of principles
Demonstrate sound
and consistently
appropriate application
of principles
Demonstrate detailed
and highly appropriate
application of principles
Page 43 of 49
Pass
Merit
Distinction
Demonstrate adequate
understanding of tools
and techniques
Demonstrate robust
understanding of tools
and techniques
Demonstrate highly
comprehensive
understanding of tools
and techniques
Be able to develop
data-driven websites
Show adequate
development
Demonstrate adequate
and appropriate
application of tools and
techniques
Demonstrate sound
and consistently
appropriate application
of tools and techniques
Demonstrate detailed
and highly appropriate
application of tools and
techniques
Understand the
functions of web
services
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 44 of 49
Pass
Merit
Distinction
Understand the
enterprise application
of database systems
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand how to
enhance the design of
and further develop a
database system
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Be able to enhance a
logical database design
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Be able to develop a
physical database
design
Show adequate
development
Be able to enhance a
database system using
SQL
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 45 of 49
Pass
Merit
Distinction
Demonstrate adequate
understanding of
common types of
cryptographic
algorithm
Demonstrate robust
understanding of
common types of
cryptographic
algorithm
Demonstrate highly
comprehensive
understanding of
common types of
cryptographic
algorithm
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand security
protocols for
protecting data on
networks
Demonstrate adequate
understanding of
security protocols
Demonstrate robust
understanding of
security protocols
Demonstrate highly
comprehensive
understanding of
security protocols
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Understand
Vulnerability
Assessments and the
weakness of using
passwords for
authentication
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to perform
simple vulnerability
assessments and
password audits
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Be able to configure
simple firewall
architectures
Demonstrate adequate
level of understanding
and ability
Demonstrate robust
level of understanding
and ability
Demonstrate highly
comprehensive level of
understanding and
ability
Understand Virtual
Private Networks
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to deploy
wireless security
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 46 of 49
Pass
Merit
Distinction
Understand the
seamless transition
from OO Analysis to
OO Design.
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand how to
convert OO analysis
and design models to
code
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Demonstrate adequate
understanding of
quality attributes
Demonstrate robust
understanding of
quality attributes
Demonstrate highly
comprehensive
understanding of
quality attributes
Understand the
concept of
maintenance within an
OO development
environment
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to produce
OO analysis and design
models using a case
tool
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Be able to convert OO
analysis and design
models to code using
an appropriate IDE
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Be able to refactor an
OO programme to
improve quality
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 47 of 49
Pass
Merit
Distinction
Understand the
background to Agile
development
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Demonstrate adequate
understanding of
techniques
Demonstrate robust
understanding of
techniques
Demonstrate highly
comprehensive
understanding of
techniques
Understand an Agile
development lifecycle
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Understand the
principles associated
with an Agile
development approach
Demonstrate adequate
level of understanding
Demonstrate robust
level of understanding
Demonstrate highly
comprehensive level of
understanding
Be able to apply an
Agile development
approach to a
particular project
scenario
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Page 48 of 49
Pass
Merit
Distinction
Identify a suitable
computing artefact and
development method
Utilise adequate
reasoning to inform
selection
Utilise highly
appropriate and
original reasoning to
inform appropriate
selection
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Demonstrate ability to
perform the task
Demonstrate ability to
perform the task
consistently well
Demonstrate ability to
perform the task to the
highest standard
Design a computing
artefact
Provide adequate
design to address the
specification
Provide wholly
appropriate and
innovative design that
meets the specification
Develop a computing
artefact
Show adequate
development
Test a computing
artefact
Demonstrate adequate
knowledge of testing
methodologies and
ability to implement
Demonstrate sound
knowledge of testing
methodologies and
ability to implement
Demonstrate
exceptional knowledge
of testing
methodologies and
ability to implement
Page 49 of 49