Demonstrate employability skills
DEMONSTRATE DIGITAL LITERACY
UNIT CODE: CT/OS/CHC/BC/03/6/A
UNIT DESCRIPTION
This unit describes competencies required to demonstrate digital literacy. It involves, identifying computer software and hardware, applying security measures to data, hardware, and software in automated environment, applying computer software in solving task, applying internet and email in communication at workplace, applying desktop publishing in official assignments and preparing presentation packages.
ELEMENTS AND PERFORMANCE CRITERIA
ELEMENT These describe the key outcomes which make up workplace function | PERFORMANCE CRITERIA These are assessable statements which specify the required level of performance for each of the elements. Bold and italicized terms are elaborated in the Range |
1. Identify appropriate computer software and hardware | 1.1 Concepts of ICT are determined in accordance with computer equipment 1.2 Classifications of computers are determined in accordance with manufacturers specification 1.3 Appropriate computer software is identified according to manufacturer’s specification 1.4 Appropriate computer hardware is identified according to manufacturer’s specification 1.5 Functions and commands of operating system are determined in accordance with manufacturer’s specification |
2. Apply security measures to data, hardware, software in automated environment | 2.1 Data security and privacy are classified in accordance with the prevailing technology 2.2 Security threats reidentified and control measures are applied in accordance with laws governing protection of ICT 2.3 Computer threats and crimes are detected in accordance to Information Management security guidelines 2.4 Protection against computer crimes is undertaken in accordance with laws governing protection of ICT |
3. Apply computer software in solving tasks | 3.1 Word processing concepts are applied in resolving workplace tasks, report writing and documentation as per the job requirements 3.2 Word processing utilities are applied in accordance with workplace procedures 3.3 Worksheet layout is prepared in accordance with work procedures 3.4 Worksheet is built and data manipulated in the worksheet in accordance with workplace procedures 3.5 Continuous data manipulated on worksheet is undertaken in accordance with work requirements 3.6 Database design and manipulation is undertaken in accordance with office procedures 3.7 Data sorting, indexing, storage, retrieval and security is provided in accordance with workplace procedures |
4. Apply internet and email in communication at workplace | 4.1 Electronic mail addresses are opened and applied in workplace communication in accordance with office policy 4.2 Office internet functions are defined and executed in accordance with office procedures 4.3 Network configuration is determined in accordance with office operations procedures 4.4 Official World Wide Web is installed and managed according to workplace procedures |
5. Apply Desktop publishing in official assignments | 5.1 Desktop publishing functions and tools are identified in accordance with manufactures specifications 5.2 Desktop publishing tools are developed in accordance with work requirements 5.3 Desktop publishing tools are applied in accordance with workplace requirements 5.4 Typeset work is enhanced in accordance with workplace standards |
6. Prepare presentation packages | 6.1 Types of presentation packages are identified in accordance with office requirements 6.2 Slides are created and formulated in accordance with workplace procedures 6.3 Slides are edited and run-in accordance with work procedures 6.4 Slides and handouts are printed according to work requirements |
RANGE
This section provides work environments and conditions to which the performance criteria apply. It allows for different work environments and situations that will affect performance.
Variable | Range |
1. Appropriate computer hardware may include but not limited to:
| Collection of physical parts of a computer system such as:
|
2. Data security and privacy may include but not limited to: |
|
3. Security and control measures may include but not limited to: |
|
4. Security threats may include but not limited to: |
|
REQUIRED SKILLS AND KNOWLEDGE
This section describes the skills and knowledge required for this unit of competency.
Required Skills
The individual needs to demonstrate the following skills:
- Analytical skills
- Interpretation
- Typing
- Communication
- Computing (applying fundamental operations such as addition, subtraction, division and multiplication)
- Using calculator
- Basic ICT skills
Required Knowledge
The individual needs to demonstrate knowledge of:
- Software concept
- Functions of computer software and hardware
- Data security and privacy
- Computer security threats and control measures
- Technology underlying cyber-attacks and networks
- Cyber terrorism
- Computer crimes
- Detection and protection of computer crimes
- Laws governing protection of ICT
- Word processing;
- Functions and concepts of word processing.
- Documents and tables creation and manipulations
- Mail merging
- Word processing utilities
- Spread sheets;
- Meaning, formulae, function and charts, uses and layout
- Data formulation, manipulation and application to cells
- Database;
- Database design, data manipulation, sorting, indexing, storage retrieval and security
- Desktop publishing;
- Designing and developing desktop publishing tools
- Manipulation of desktop publishing tools
- Enhancement of typeset work and printing documents
- Presentation Packages;
- Types of presentation Packages
- Creating, formulating, running, editing, printing and presenting slides and handouts
- Networking and Internet;
- Computer networking and internet.
- Electronic mail and world wide web
- Emerging trends and issues in ICT;
- Identify and integrate emerging trends and issues in ICT
- Challenges posed by emerging trends and issues
EVIDENCE GUIDE
This provides advice on assessment and must be read in conjunction with the performance criteria, required skills and knowledge and range.
1. Critical Aspects of Competency | Assessment requires evidence that the candidate: 1.1 Identified and controlled security threats 1.2 Detected and protected computer crimes 1.3 Applied word processing in office tasks 1.4 Designed, prepared work sheet and applied data to the cells in accordance to workplace procedures 1.5 Opened electronic mail for office communication as per workplace procedure 1.6 Installed internet and World Wide Web for office tasks in accordance with office procedures 1.7 Integrated emerging issues in computer ICT applications 1.8 Applied laws governing protection of ICT |
2. Resource Implications | The following resources should be provided: 2.1 Access to relevant workplace where assessment can take place 2.2 Appropriately simulated environment where assessment can take place |
3. Methods of Assessment | Competency may be assessed through: 3.1 Observation 3.2 Oral questioning 3.3 Written test 3.4 Portfolio of Evidence 3.5 Interview 3.6 Third party report |
4. Context of Assessment | Competency may be assessed: 4.1 On-the-job 4.2 Off-the –job 4.3 During Industrial attachment |
5. Guidance information for assessment | Holistic assessment with other units relevant to the industry sector, workplace and job role is recommended. |