0% found this document useful (0 votes)
2 views

2.2 Perform computer operations

The document outlines the unit titled 'Perform Computer Operations' (ELC311203), detailing the skills and knowledge required for effective computer operation, including data input, access, output production, and equipment maintenance. It specifies performance criteria across various elements such as planning tasks, using software and hardware, and adhering to safety and security guidelines. Additionally, it includes a range of variables, evidence guide, and assessment methods to evaluate competency in computer operations.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

2.2 Perform computer operations

The document outlines the unit titled 'Perform Computer Operations' (ELC311203), detailing the skills and knowledge required for effective computer operation, including data input, access, output production, and equipment maintenance. It specifies performance criteria across various elements such as planning tasks, using software and hardware, and adhering to safety and security guidelines. Additionally, it includes a range of variables, evidence guide, and assessment methods to evaluate competency in computer operations.
Copyright
© © All Rights Reserved
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT TITLE : PERFORM COMPUTER OPERATIONS

UNIT CODE : ELC311203

UNIT DESCRIPTOR : This unit covers the knowledge, skills, attitudes and values
needed to perform computer operations which include
inputting, accessing, producing and transferring data using the
appropriate hardware and software.

ELEMENTS PERFORMANCE CRITERIA


Italicized terms are elaborated in the Range of Variables
1. Plan and prepare for 1.1. Requirements of task are determined in accordance
task to be taken with the required output.
undertaken 1.2. Appropriate hardware and software are selected
according to task assigned and required outcome.
1.3. Task is planned to ensure that OH & S guidelines
and procedures are followed.
1.4. Client -specific guidelines and procedures are
followed.
1.5. Required data security guidelines are applied in
accordance with existing procedures.
2. Input data into 2.1. Data are entered into the computer using
computer appropriate program/application in accordance with
company procedures.
2.2. Accuracy of information is checked and information
is saved in accordance with standard operating
procedures.
2.3. Inputted data is stored in storage media according
to requirements.
2.4. Work is performed within ergonomic guidelines.
3. Access information 3.1. Correct program/application is selected based on
using computer job requirements.
3.2. Program/application containing the information
required is accessed according to company
procedures.
3.3. Desktop icons are correctly selected, opened and
closed for navigation purposes.
3.4. Keyboard techniques are carried out in line with OH
& S requirements for safe use of keyboards.

___________________________________________________________________________________ 1
TR - COMPUTER SYSTEMS SERVICING NC II Amended - December 2013
4. Produce output/ data 4.1. Entered data are processed using appropriate
using computer system software commands.
4.2. Data are printed out as required using computer
hardware /peripheral devices in accordance with
standard operating procedures.
4.3. Files and data are transferred between compatible
systems using computer software,
hardware/peripheral devices in accordance with
standard operating procedures.
5. Use basic functions of 5.1. Information requirements for internet search are
a www-browser to established.
locate information 5.2. Browser is launched.
5.3. Search engine is loaded.
5.4. Appropriate search criteria/or URL of site is entered.
5.5. Relevant links are followed to locate required
information.
5.6. Useful pages are bookmarked or printed as
required.
6. Maintain computer 6.1. Procedures for ensuring security of data, including
equipment and regular back-ups and virus checks are implemented
systems in accordance with standard operating procedures.
6.2. Basic file maintenance procedures are
implemented in line with the standards operating
procedures.

___________________________________________________________________________________ 2
TR - COMPUTER SYSTEMS SERVICING NC II Amended - December 2013
RANGE OF VARIABLES

VARIABLE RANGE

1 Hardware and 1.1 Personal computers


peripheral devices 1.2 Networked systems
1.3 Communication equipment
1.4 Printers
1.5 Scanners
1.6 Keyboard
1.7 Mouse
1.8 Voice/Data logger
2 Software Software includes the following but not limited to:
2.1 Word processing packages
2.2 Database packages
2.3 Internet
2.4 Spreadsheets
2.5 Client Specific Software
3 OH & S guidelines 3.1 OHS guidelines
3.2 Enterprise procedures
4 Storage media Storage media include the following but not limited to:
4.1 Diskettes
4.2 CDs
4.3 Zip disks
4.4 hard disk drives, local and remote
4.5 Optical drives
5 Ergonomic guidelines 5.1 Types of equipment used
5.2 Appropriate furniture
5.3 Seating posture
5.4 Lifting posture
5.5 Visual display unit screen brightness
6 Desktop icons Icons include the following but not limited to:
6.1 Directories/folders
6.2 Files
6.3 Network devices
6.4 Recycle bin
6.5 Program icons
7 Maintenance 7.1 Creating and managing more space in the hard disk
and other peripherals
7.2 Reviewing programs
7.3 Deleting unwanted files
7.4 Backing up files
7.5 Checking hard drive for errors
7.6 Using up to date anti-virus programs
7.7 Cleaning dust from internal and external surfaces

___________________________________________________________________________________ 3
TR - COMPUTER SYSTEMS SERVICING NC II Amended - December 2013
EVIDENCE GUIDE

1 Critical aspects of 1.1 Assessment must show that the candidate:


competency 1.2 Selected and used hardware components correctly and
according to the task requirement
1.3 used basic software applications to create new files and
documents
1.4 Produced accurate and complete data in accordance with
the requirements
1.5 Used appropriate devices and procedures to transfer
files/data accurately
1.6 Used basic functions of a www-browser to locate
information.
2 Underpinning 2.1 Basic ergonomics of keyboard and computer user
knowledge 2.2 Main types of computers and basic features of different
operating systems
2.3 Main parts of a computer
2.4 Storage devices and basic categories of memory
2.5 Relevant types of software
2.6 General security, privacy legislation and copyright
2.7 Viruses
2.8 OH & S principles and responsibilities
2.9 Calculating computer capacity
2.10 Productivity Application
2.11 Business Application
2.12 System Software
3 Underpinning 3.1 Reading and comprehension skills required to interpret
skills work instruction and to interpret basic user manuals.
3.2 Communication skills to identify lines of communication,
request advice, follow instructions and receive feedback.
3.3 Technology skills to use equipment safely including
keyboard skills.
4 Method of The assessor may select two of the following assessment
assessment methods to objectively assess the candidate:
4.1 Direct Observation and Oral Questioning
4.2 Practical demonstration
5 Resource 5.1 Computer hardware with peripherals
implication 5.2 Appropriate software
6 Context of 6.1 Assessment may be conducted in the workplace or in a
Assessment simulated environment

___________________________________________________________________________________ 4
TR - COMPUTER SYSTEMS SERVICING NC II Amended - December 2013

You might also like