The important thing to remember when gathering evidence is that the more evidence the better - that is, the more evidence you gather to demonstrate your skills, the more confident an assessor can be that you have learned the skills not just at one point in time, but are continuing to apply and develop those skills (as opposed to just learning for the test!). Furthermore, one piece of evidence that you collect will not usualy demonstrate all the required criteria for a unit of competency, whereas multiple overlapping pieces of evidence will usually do the trick!
From the Wiki University
What evidence can you provide to prove your understanding of each of the following citeria?
Prepare to program integrated system access control
|
|
The functions of integrated system access is determined from the systems data base and customer requirements. Completed |
Evidence:
|
Control parameters are determined from the integrated systems data base and confirmed with the customer. Completed |
Evidence:
|
Programming software tools and project data are down loaded to a compatible PC and checked. Completed |
Evidence:
|
Manufacturer’s instruction for installing and connecting internet connectivity equipment are read and understood. Completed |
Evidence:
|
Program integrated system access control
|
|
OHS risk control work measures and procedures are followed. Completed |
Evidence:
|
Knowledge of integrated system logic-based programming methods are used in programming access control. Completed |
Evidence:
|
Integrated system functions and parameters are programmed for compatibly with the integrated system and to customer requirements Completed |
Evidence:
|
Network connectivity is implemented in accordance with manufacturer’s instruction and regulatory requirements. Completed |
Evidence:
|
Back up, transfer and test system access control
|
|
OHS work completion risk control measures and procedures are followed. Completed |
Evidence:
|
Programmed functions and parameters are backed up and transfer to the system following manufacturer’s instructions. Completed |
Evidence:
|
System access tests are conducted to verify compatibility and compliance with the integrated system and customer requirements. Completed |
Evidence:
|
Non-compliance operations and anomalies are corrected to comply with manufacturer’s and customer requirements. Completed |
Evidence:
|
A copy of the documentation of the as-programmed access specifications is given the client or client’s representative. Completed |
Evidence:
|