Copy and paste from the following data to produce each assessment task. Write these in plain English and spell out how, when and where the task is to be carried out, under what conditions, and what resources are needed. Include guidelines about how well the candidate has to perform a task for it to be judged satisfactory.
Required skills
communication skills to:
communicate with peers and supervisors
seek assistance and expert advice
undertake online transactions
keyboarding skills to enter text into web browsers and email applications
literacy skills to:
compose email messages
read and interpret basic online content
read and write at a basic level
problem-solving skills to address common operational problems when using web browsers
research skills to locate varied sources of information online
technical skills to:
operate a digital device
use email applications
use internet search functions
use peripheral hardware.
Required knowledge
types and basic components of hardware and storage devices
types of online entertainment
types of online communication
basic research and analysis theory
basic copyright legislation
digital footprint and basic security, safety and legal issues
OHS, including basic ergonomics of keyboard and computer use
types of online participation
types of online transactions
device interface
desk top icons
basic principles of web browser search engines
internet
features of basic applications.
The range statement relates to the unit of competency as a whole. It allows for different work environments and situations that may affect performance. Bold italicised wording, if used in the performance criteria, is detailed below. Essential operating conditions that may be present with training and assessment (depending on the work situation, needs of the candidate, accessibility of the item, and local industry and regional contexts) may also be included.
Hardware components may include: | Bluetooth device fax and modem keyboard laptop mobile phone monitor mouse multimedia kit personal computer personal digital assistant (PDA), such as palmtop printer scanner speaker tape cartridge universal serial bus (USB) device wi-fi router. |
Connectivity of devices may include: | Bluetooth device hard drive keyboard laptop mobile phone modem mouse multimedia kit pen PDA, such as palmtop printer scanner speaker tape cartridge touch pad USB device wireless fidelity (wi-fi) router headphone and microphone web camera. |
OHS compliantmay include: | electrical safety ergonomics in the workplace: correct posture style and adjustment of chair type of desk type of monitor working position length of time in front of computer lighting level placement of light fittings repetitive strain injury (RSI) prevention safe lifting methods ventilation social problems associated with internet and computing addictions. |
Relevant internet sites may be used for: | entertainment: internet TV games videos and podcasts music communication: email Skype instant messaging finding using and storing information: searching to enhance personal knowledge and interest and to make informed decisions participating online online consultation, forum and discussion posting photos and videos applying for jobs networking and collaboration: social networking online dating transactions banking government services, including registrations buying and selling: travel paying bills trading shares. |
Copyright and intellectual propertymay relate to: | copyright infringement legislation electronic resources usage policies ethical use of digital technologies ethical decision making when facing inappropriate acts of technology use. |
Socially responsible behaviourmay relate to: | not using obscene, profane, lewd, vulgar, rude, inflammatory or threatening language not publishing information that, if acted upon, could cause damage to property or persons, nor publish deliberately false or defamatory information about a person or organisation not engaging in personal attacks, including prejudicial or discriminatory attacks not harassing, distressing or annoying another person not accessing material that is profane, obscene or pornographic, that promotes illegal acts, or that advocates violence or discrimination not sending inappropriate emails taking responsibility for protecting personal information and not revealing personal information, including names, addresses, photographs, credit card details and telephone numbers. |
Browser software security may include: | application enabling cookie handling pop-up blocking privacy levels security zones trusted sites. |
Email security may relate to: | taking steps to restrict: malware phishing spam scams. |
Digital footprint may include: | tracking of internet usage, such as: system login and logouts visits to a web page accessed or created files email messages chat messages. |
External backup devices may include: | DVDs memory cards memory sticks USB drives hard drives. |
Secure transactions may include: | web browser - secure socket layer (SSL) security verified sites digital certificates - VeriSign online payment services - PayPal stored-value cards smart cards point-of-sale devices digital cash e-wallets. |
Methods of internet fraud may include: | invalid internet sites credit card fraud identification theft impulse buying strategies. |
Basic applications may include: | databases email internet browsers spreadsheets system browsers word processing. |
Copy and paste from the following performance criteria to create an observation checklist for each task. When you have finished writing your assessment tool every one of these must have been addressed, preferably several times in a variety of contexts. To ensure this occurs download the assessment matrix for the unit; enter each assessment task as a column header and place check marks against each performance criteria that task addresses.
Observation Checklist