Mohammed Al Harbi Unit 03 - HST AFOHS - 1C Workbook

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Associate Diploma in Occupational Health and

Safety
Assignment Unit 03 – Use Information Technology
applications software

Student Name: Mohammed Al Harbi


Group: ADOHS-1C
Assessor: Mr. EL Haj Sow
Internal Verifier:

Release Date: 15/11/2019


Submission Date: 05/12/2019
Units Covered in This Assignment:

Unit 03 – Use Information Technology applications software

Assessment Criteria
During this assignment learners will undertake a number of activities that will support them
in achieving selected criteria for units on the associate diploma in occupational health and
safety course.
These units are:

Unit Number Unit Title Unit Criteria Covered

03 Use Information Technology applications software LO1,02,03

Methods of Assessment
During the course of this assignment you will be assessed by:
o Independent study
o Reports
o Presentations
o Practical work
o Portfolio Evidence
Submission of Learner Work
All learners should submit evidence for this assignment to their E-Portfolio by the set
submission date. Access to the E-Portfolio is available via the following link
https://eportfolio.sss.org.sa/COE1
0029/Final Grading of the Assignment
This assignment will be graded on a scale of A-D:
Guidance on the criteria for these grades can be found on page 8.
Learners may submit this assignment 3 times for marking. The grade awarded at the 3rd
point of submission will be the final grade.
Plagiarism
It is your qualification so it must be your own work. Your assessor must be able to identify
which work you have done yourself, and what you have found from other sources. It is
therefore important to make sure you acknowledge all of your sources. Your assessor can
show you how to do this for the assessment you are doing.

1|Pa ge
Unit 03 – Use Information Technology applications software
Purpose:

This unit is designed to enable individuals to use information technology (IT) systems and
applications independently to support a range of information processing activities.

The unit is designed to develop a broad knowledge of the theoretical concepts, principles,
boundaries and scope of IT applications. These activities center on using software applications
and packages to meet complex information requirements while paying attention to security and
the needs of other users.
The learner will be able to: Performance criteria:
1.Operate a range of IT equipment independently, 1.1 Start up and close down the operating system
giving attention to security and to other users 1.2 Open and close software packages
1.3 Locate data and applications
1.4 Use a computer filing system
1.5 Use tools within the operating system
1.6 Implement security measures responsibly and
with consideration for the needs of other users
1.7 Resolve simple hardware and software problems
1.8 Follow on-screen
2.Use a range of software application packages to 2.1 Identify the information requirements of users
meet complex information requirements and decide how these requirements can be met
2.2 Select software applications packages which
meet the identified information requirements
2.3 Use software applications packages to process
the identified information requirements
2.4 Add, alter or delete information as needed
2.5 Carry out searches to extract and present
relevant information from suitable local and remote
computer data sources taking account of efficiency
in terms of time, cost, effective filtering and
outcome
2.6 Integrate different data types
2.7 Format the product so that the final output
meets the identified information requirements and
is clear and helpful to users
2.8 Produce output in print or electronic form to
meet requirements
2.9 Store completed files appropriately in
accordance with organization requirements
3.Evaluate use of information technology in 3.1 Identify barriers to resource availability and
occupational health and safety potential causes or factors contributing to those
barriers
3.2 Document lessons learnt against the work plan
and report within the organization
3.3 Propose suggestions for improvements to
workplace practices involving information
technology applications software
3.4 Complete work reports accurately and submit to
appropriate person(s)

2|Pa ge
Scenario:

You are working at the Niagara college as a Health & Safety officer. The Executive Manager has
asked you to prepare a report to help your colleagues to overcome some difficulties using
computer software application and a presentation about a fire drill workshop for the next week,
in addition you need to add your suggestions and recommendations at the end of this report.

To that you are required to complete the below tasks and send it to your manager using a
proper way.

Guidance
You have to prove the evidence to answer the question; you can use text, images, video and
sound.

Task 1 (Outcome 1.1)

Show how you shut down the computer (provide screenshots).


Steps

screenshots
Step 1

3|Pa ge
Step 2

4|Pa ge
Commented [Ma1]: Excellent job
Step 3

Task 2 (Outcome 1.2,1.3,1.4)

Create the following:

 Create a folder in my documents with your name.


 Create a text file using notepad name it ‘Sunday meeting’.
 Create an Excel sheet using MS. Excel name it ‘Monthly Salary’.
 Put a screen shot below.

5|Pa ge
Mohammed Al
Alharbi

Commented [Ma2]: Excellent job

Task 3 (Outcome 1.5,1.8)

Explain the following tools in windows by giving screen shot:

6|Pa ge
Disk clean up Disk clean up

Tool

7|Pa ge
Clean hard drive C show the free space before and Clean hard drive C show the free space before and

task
after cleaning after cleaning

Required
Step 2 Step 1 Steps

Screen shot

Commented [Ma4]: Excellent job


Commented [Ma3]: Excellent job
Disk clean up Disk clean up

8|Pa ge
Clean hard drive C
Clean hard drive C show the free space before and
show the free
after cleaning
space before and
after cleaning
Step 4 Step 3

Commented [Ma6]: Excellent job


Commented [Ma5]: Excellent job
Disk clean up

9|Pa ge
Clean hard drive C show the free space before and after
cleaning

Step 5

Commented [Ma7]: Excellent job


Scan disk & Snipping tool Scan disk & Snipping tool

10 | P a g e
Scan you hard drive C for any errors, put
Scan you hard drive C for any errors, put screenshots for
screenshots for all steps using snipping tool for each
all steps using snipping tool for each window.
window.

Step 2 Step 1

Commented [Ma9]: Excellent job


Commented [Ma8]: Excellent job
Scan disk & Snipping tool

11 | P a g e
Scan you hard drive C for any errors, put screenshots for all
steps using snipping tool for each window.

Step 3
Commented [Ma10]: Excellent job
Scan disk & Snipping tool Scan disk & Snipping tool

12 | P a g e
Scan you hard drive C for any errors, put
Scan you hard drive C for any errors, put screenshots for all
screenshots for all steps using snipping tool
steps using snipping tool for each window.

Task 4 (Outcome 1.6)


for each window.

Step 5 Step 4

Commented [Ma12]: Excellent job


Commented [Ma11]: Excellent job
A Explain what makes a complex password.
1. Capital letters and small.
2. Numbers.
3. Symbols.

Navigate to the following


website https://www.grc.com/haystack.htm using the password that you
B set on your computer. Test your password and place a screen shot of the
results below. Commented [Ma13]: Excellent job

Explain the following, you can use pictures to support your explanations

C Explain the term EFS


Short for Encrypting File System, part of the Microsoft NTFS file system. EFS is
a transparent public key encryption technology that works in conjunction with NTFS
permissions to grant and deny users access to files and folders in
Windows NT (excluding NT4), 2000 and XP (excluding XP Home Edition) operating
systems.
EFS uses a public key and a private key for encryption. If the user does not have one,
the EFS generates the key pair automatically. Files can be encrypted individually, or a
folder can be designated as encrypted, so that any file written to that folder is
automatically encrypted. Because EFS's encryption technology integrates into the file
system, users can't access the hard disk without going through the file system.

13 | P a g e
EFS is not available in Windows versions 95, 98 or Me as these operating systems use
the FAT16 and FAT32 file systems.

D How to encrypt a folder using EFS?


Select files or folders to encrypt with EFS and then do the following:
1. Start Windows Explorer in the Start menu, in the desktop or in the taskbar.
2. Right-click on the file or folder and select “Properties” in the menu.
3. In the tab “General” click on Advanced.
4. Check the box next to Encrypt contents to secure data.

When looking in windows explorer how can you tell if a folder has been
E encrypted?
1. open a cmd prompt.
2. Enter the command: cipher encryption.txt.
3. Open the file "encryption.txt" To find encrypted folders, search for "will be encrypted"
To find encrypted files, search for "E" at the beginning of a line.

14 | P a g e
Task 5 (Outcome 1.7)

Explain how you would resolve these simple problems

Problem Repair

1. Check to make sure the printer is turned on and connected to the same Wi-Fi network as
your device.
2. Run a printer power cycle.
Printer 3. Set your printer as the default printer
offline 4. Clear the print queue.
5. Reset the service that manages the printing queue.
6. Remove and re-add your printer to your device.
7. Restart your PC.

1. Run the audio trouble-shooter.


2. Verify that all Windows Updates are installed.
3. Check your cables, plugs, jacks, volume, speaker, and headphone connections.
4. Check sound settings.
5. Fix your audio drivers.
Sound not 6. Set your audio device as the default device.
working 7. Turn off audio enhancements.
8. Restart Audio Services.
9. Try different audio formats.
10. Restart to apply installed updates.
11. Check for IDT High Definition Audio CODEC in Device Manager.
12. If you have microphone issues, make sure your privacy settings are configured properly.

1. Update your drivers.


2. Adjust power plan settings for your hard disk.
Application 3. Delete the temp files.
freeze 4. Adjust your virtual memory.
5. Run Windows Memory Diagnostic.
6. Perform a system restore. Commented [Ma14]: Excellent job

Task 6 (Outcome 2.1,2.2,2.3,2.4,2.5,2.6,2.7,2.8,2.9)

 You are to invite your colleagues to a Fire Training event. You have been given a Word file,
an Excel file and a Video clip. You are to use an application (PowerPoint Presentation) that
will allow you to integrate these files together. The contents of the Word and Excel files will
be copied and pasted onto the PowerPoint file. The Video clip will be inserted into the
PowerPoint file. You will also need to acquire at least 2 images about Fire Training (search
online) and copy paste them on the given Word file above.

 Now, produce two files (printable file and video file) in formats that are suitable for anyone
without Microsoft office installed to view them.

15 | P a g e
 To complete this task, you are requiring to do the following:

 Create your own YouTube channel.

 Create a PowerPoint Presentation to integrate all the required information above.

 Convert the above presentation to a video file - using the site:

https://video.online-convert.com/convert-to-mp4 - and upload it to your channel.

 Produce a handout for this event and upload it to your drive – using the site:

https://files.fm/

 Put a shared link to these 2 files (Video and Word) using the below boxes.

Video link: https://youtu.be/KX3se5QRQ1M

Handout link: https://drive.google.com/open?id=1tkZ-1H7FN8k5kH4PXwGbefploKx75hwv Commented [Ma15]: Excellent job

16 | P a g e
Grading criteria
Grade D
The trainee has
Uses limited skill gathering techniques to answer questions and perform tasks. Y
produced a presentation that contains limited information Y
Works in a safe manner. Y

Grade C
The trainee has achieved everything at grade D and has
Demonstrates basic ability to answer questions and gather information regarding
specific topics.
Y
Produced a video that contains basic information in a clear and concise manner. Y
Merged 2 different applications with the video Y
Grade B

The trainee has achieved everything at grade D and C and has


Produced detailed video that contains the scope of the project Y
Successfully answers all questions and records relevant information. Y
Work completed and handed in on time. Y

Grade A
The trainee has achieved everything at grade D, C and B and has
Prepared clear and comprehensive documentation that contains all of the required Y
elements.

Produces information with no grammatical, spelling or punctuation errors. Y


Prepared a professional report form contains clear suggestion. Y

1|Pa ge
Assessor Feedback
Feedback
Grade A
Mohammed AL Harbi has very good Computer skills, he has
shown all the required skills, answered all the questions
correctly.

Assessor Name Khalid Najjar

Assessor Khalid Najjar


Signature
Date 22/04/2020

2|Pa ge

You might also like