Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Ok, I understand!
Your school or university
Improve your search results. Select your educational institution and subject so that we can show you the most relevant documents and help you in the best way possible.
Here are the best resources to pass Unit 14 Software engineering for business. Find Unit 14 Software engineering for business study guides, notes, assignments, and much more.
All
12 results
Sort by
P4- Specify suitable components to meet user requirements
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
P4- Specify suitable components to meet user requirements
Last document update:
ago
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
P1- Identify the common components of a computer system
Essay • 18
pages
• 2017
For P1, learners must identify the different types of hardware
and software components of a computer system. Evidence
could be in the form of a presentation or video of the learner
identifying the components
P1- Identify the common components of a computer system
Last document update:
ago
For P1, learners must identify the different types of hardware
and software components of a computer system. Evidence
could be in the form of a presentation or video of the learner
identifying the components
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
P6- Configure software for a given user requirement
Last document update:
ago
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
P5- Connect hardware safely to a computer system, testing for functionality
Last document update:
ago
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for £15 each. Every. Single. Day.
For distinction criterion D2, learners must provide evidence of
using a range (three or more) of software utilities to check the
security of a computer system. The computer system could be
the same system that they have been using throughout the
assessment of this unit. The evidence should include information
relating to the security check being carried out, the software
utility being used, the result of the check, issues identified if any 
www.ocr.org.uk 10
and remedial action to be taken if an...
D2- Check a computer system for security risks using a range of software utilities
Last document update:
ago
For distinction criterion D2, learners must provide evidence of
using a range (three or more) of software utilities to check the
security of a computer system. The computer system could be
the same system that they have been using throughout the
assessment of this unit. The evidence should include information
relating to the security check being carried out, the software
utility being used, the result of the check, issues identified if any 
www.ocr.org.uk 10
and remedial action to be taken if an...
P2- Describe the purpose of different types of computer systems
Essay • 5
pages
• 2017
For P2, learners must describe the purposes of different
computer systems. They should identify different computer
systems and describe why they are used. The evidence
could take the format of an audio recording of a discussion
with the learner, a video of them giving a presentation, the
presentation slides and speaker’s notes, a report or a leaflet.
For merit criterion M1, learners could extend their evidence or
P2 to include the benefits of the different computer systems for
different purpos...
P2- Describe the purpose of different types of computer systems
Last document update:
ago
For P2, learners must describe the purposes of different
computer systems. They should identify different computer
systems and describe why they are used. The evidence
could take the format of an audio recording of a discussion
with the learner, a video of them giving a presentation, the
presentation slides and speaker’s notes, a report or a leaflet.
For merit criterion M1, learners could extend their evidence or
P2 to include the benefits of the different computer systems for
different purpos...
For distinction criterion D1, learners should evaluate any changes
made to the system and how this meets the needs of the end
user and the original specification of the computer system. If
learners have not made any changes, then they should evaluate
changes which could be made. The evidence could be in the form
of an audio recording of a discussion, a video diary, presentation
(which could also be videoed) or a report.
D1- Evaluate any changes to the system
Last document update:
ago
For distinction criterion D1, learners should evaluate any changes
made to the system and how this meets the needs of the end
user and the original specification of the computer system. If
learners have not made any changes, then they should evaluate
changes which could be made. The evidence could be in the form
of an audio recording of a discussion, a video diary, presentation
(which could also be videoed) or a report.
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
P7- Identify potential security risks
Last document update:
ago
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
M3- Justify that the chosen software meets a given user requirement
Last document update:
ago
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
Fear of missing out? Then don’t!
Do you wonder why so many students wear nice clothes, have money to spare and enjoy tons of free time? Well, they sell on Stuvia! Imagine your study notes being downloaded a dozen times for £15 each. Every. Single. Day.
Discover all about earning on Stuvia