Sei sulla pagina 1di 4

SESSION PLAN

Sector : ELECTRONICS SECTOR


Qualification Title : COMPUTER SYSTEMS SERVICING NC II
Unit of Competency : SET-UP COMPUTER SERVERS
Module Title : SETTING-UP COMPUTER SERVERS
LERNING CONTENT ASSESMENT CRITERIA
from EVIDENCE GUIDE From PERFORMANCE CRITERIA
underpinning knowledge
LO 1: Set-up user access LO 1: Set-up user access
Content Content
3.1.1 Network operating system (NOS) 1.1 User folder is created in accordance
features with network operating system (NOS)
3.1.2 Setting-up and configuring servers features
3.1.3 User access level configuration 1.2 User access level is configured based
3.1.4 Setting-up client/user access and on NOS features and established
security network access policies/end-user
requirements.
* Promote Computer Server to Domain 1.3 Security check is performed in
Controller (Network Services-Range of accordance with established
Variables) by installing Active Directory network access policies/end-user
requirements.

RANGE OF VARIABLES
Normal functions of 1.1 no error on boot sequence
Server 1.2 network connectivity
Network Services 2.1 remote access
2.2 domain controller
2.3 web services
2.4 database services
2.5 proxy server
2.6 file, printer and other
resources sharing
pre-deployment 3.1 installation of application
procedures 3.2 populating database

LO 2: Configured network services LO 2: Configured network services


Content Content
3.2.1 Computer servers and functions 2.1. Normal functions of server are
3.2.2 Types of Network services checked in accordance with
3.2.3 Network services configuration manufacturer’s instructions
 configuring web services 2.2. Required modules /add-ons are
 configuring file sharing services installed/updated based on NOS
 configuring print sharing services installation procedures
3.2.4 Web applications/technologies 2.3. Network services to be configured
3.2.5 Installing and configuring are confirmed based on user/system
modules/add-ons requirements
3.2.6 Configuration of network services 2.4. Operation of network services are
checked based on user/system
requirements
2.5. Unplanned events or conditions are
responded to in accordance with
established procedures
LO 3: Performed testing, LO 3: Performed testing,
documentation and pre- documentation and pre-
deployment procedures deployment procedures
LC 3.3.1 Testing procedures Content
LC 3.3.2 Pre-deployment procedures and 3.1. Pre-deployment procedures is
practices undertaken based on enterprise
LC 3.3.3 Enterprise policies and policies and procedures
procedures 3.2. Operation and security check are
LC 3.3.4 End user requirements undertaken based on end-user
LC 3.3.5 Documentation and making requirements
reports 3.3. Reports are prepared/completed
according to enterprise policies and
procedures.
EVIDENCE GUIDE ASSESSMENT CRITERIA
(Underpinning Knowledge) (Module Content)
Source: Training Regulations Source: Session Plan

PERFORMANCE CRITERIA
Source: Training Regulations
Section 2 (Competency
Standards)

2.1. Network operating system (NOS) 1. User folder is created in accordance


features with network operating system (NOS)
2.2. Computer servers and functions features
2.3. Types of Network services 2. User access level is configured based
2.4. User access level configuration on NOS features and established
2.5. Network services configuration network access policies/end-user
2.5.1. configuring web services requirements.
2.5.2. configuring file sharing 3. Security check is performed in
services accordance with established network
2.5.3. configuring print sharing access policies/end-user
services requirements.
2.6. Web applications/technologies
2.7. Setting-up client/user access and 4. Required modules /add-ons are
security installed/updated based on NOS
2.8. Setting-up and configuring servers installation procedures
2.9. Installing and configuring 5. Normal functions of server are
modules/add-ons checked in accordance with
2.10. Configuration of network services manufacturer’s instructions.
2.11. Testing procedures 6. Network services to be configured are
2.12. Pre-deployment procedures and confirmed based on user/system
practices requirements.
2.13. Enterprise policies and procedures 7. Operation of network services are
2.14. End user requirements checked based on user/system
* 2.15. Enterprise policies and procedures requirements.
2.16. Documentation and making reports 8. Unplanned events or conditions are
responded to in accordance with
established procedures.

9. Pre-deployment procedures is
undertaken based on enterprise
policies and procedures.
10. Operation and security check are
undertaken based on end-user
requirements.
11. Reports are prepared/completed
according to enterprise policies and
procedures.

Potrebbero piacerti anche