Unit 14 Software engineering for business

OCR

Here are the best resources to pass Unit 14 Software engineering for business. Find Unit 14 Software engineering for business study guides, notes, assignments, and much more.

All 12 results

Sort by

P4- Specify suitable components to meet user requirements
  • P4- Specify suitable components to meet user requirements

  • Essay • 10 pages • 2017
  • Available in package deal
  • For P4, learners must specify the components to be used to create a computer system for a specified end user. This should include hardware components, any peripherals, software systems, application software and utilities which they would recommend. Evidence for this could be in the form of a presentation, report, video/audio discussion.
    (1)
  • £2.99
  • 1x sold
  • + learn more
P1- Identify the common components of a computer system
  • P1- Identify the common components of a computer system

  • Essay • 18 pages • 2017
  • For P1, learners must identify the different types of hardware and software components of a computer system. Evidence could be in the form of a presentation or video of the learner identifying the components
    (0)
  • £2.99
  • 1x sold
  • + learn more
P6- Configure software for a given user requirement
  • P6- Configure software for a given user requirement

  • Essay • 8 pages • 2017
  • Available in package deal
  • For P6, learners must configure at least two pieces of software to meet the needs of a specified user. Evidence could be in the form of a video, detailed observation or annotated screen captures.
    (1)
  • £2.99
  • 1x sold
  • + learn more
P5- Connect hardware safely to a computer system, testing for functionality
  • P5- Connect hardware safely to a computer system, testing for functionality

  • Essay • 10 pages • 2017
  • Available in package deal
  • For P5, learners must provide evidence of connecting hardware to a computer system and test the functionality of the system. The learners should connect at least three hardware components, one of which should be internal to the system. The evidence could be in the form of a video, series of annotated photographs or detailed observation of the learner connecting the hardware. The learners should be demonstrating safe working practices. The learners must also include a test plan with the headings ...
    (1)
  • £2.99
  • + learn more
P2- Describe the purpose of different types of computer systems
  • P2- Describe the purpose of different types of computer systems

  • Essay • 5 pages • 2017
  • For P2, learners must describe the purposes of different computer systems. They should identify different computer systems and describe why they are used. The evidence could take the format of an audio recording of a discussion with the learner, a video of them giving a presentation, the presentation slides and speaker’s notes, a report or a leaflet. For merit criterion M1, learners could extend their evidence or P2 to include the benefits of the different computer systems for different purpos...
    (0)
  • £2.99
  • + learn more
D2- Check a computer system for security risks using a range of software utilities
  • D2- Check a computer system for security risks using a range of software utilities

  • Essay • 5 pages • 2017
  • Available in package deal
  • For distinction criterion D2, learners must provide evidence of using a range (three or more) of software utilities to check the security of a computer system. The computer system could be the same system that they have been using throughout the assessment of this unit. The evidence should include information relating to the security check being carried out, the software utility being used, the result of the check, issues identified if any www.ocr.org.uk 10 and remedial action to be taken if an...
    (0)
  • £2.99
  • + learn more
D1- Evaluate any changes to the system
  • D1- Evaluate any changes to the system

  • Essay • 4 pages • 2017
  • Available in package deal
  • For distinction criterion D1, learners should evaluate any changes made to the system and how this meets the needs of the end user and the original specification of the computer system. If learners have not made any changes, then they should evaluate changes which could be made. The evidence could be in the form of an audio recording of a discussion, a video diary, presentation (which could also be videoed) or a report.
    (0)
  • £2.99
  • + learn more
P7- Identify potential security risks
  • P7- Identify potential security risks

  • Essay • 4 pages • 2017
  • Available in package deal
  • For P7, learners must identify the potential security risks that can apply to a computer system. The computer system should be the same system that they have been been configuring software on. The evidence could be presented as a recorded discussion, presentation with speaker notes (which could also be videoed) or a report.
    (0)
  • £2.99
  • + learn more
M3- Justify that the chosen software meets a given user requirement
  • M3- Justify that the chosen software meets a given user requirement

  • Essay • 3 pages • 2017
  • Available in package deal
  • For merit criterion M3, learners must provide a justification as to why the configuration that they have carried out meets the needs of the specified end user. This could be included as a verbal justification during the video of the customisation, response to questions from the teacher, additional annotation of the screen captures, a presentation or report.
    (0)
  • £2.99
  • + learn more