Unit 14 Software engineering for business

OCR

Here are the best resources to pass Unit 14 Software engineering for business. Find Unit 14 Software engineering for business study guides, notes, assignments, and much more.

All 12 results

Sort by

P1- Identify the common components of a computer system
  • P1- Identify the common components of a computer system

  • Essay • 18 pages • 2017
  • For P1, learners must identify the different types of hardware and software components of a computer system. Evidence could be in the form of a presentation or video of the learner identifying the components
    (0)
  • $3.89
  • 1x sold
  • + learn more
P2- Describe the purpose of different types of computer systems
  • P2- Describe the purpose of different types of computer systems

  • Essay • 5 pages • 2017
  • For P2, learners must describe the purposes of different computer systems. They should identify different computer systems and describe why they are used. The evidence could take the format of an audio recording of a discussion with the learner, a video of them giving a presentation, the presentation slides and speaker’s notes, a report or a leaflet. For merit criterion M1, learners could extend their evidence or P2 to include the benefits of the different computer systems for different purpos...
    (0)
  • $3.89
  • + learn more
P3- Represent how data flows around a computer system
  • P3- Represent how data flows around a computer system

  • Essay • 1 pages • 2017
  • For P3, learners must represent how data flows around a computer system; this could be using annotated diagrams and or flow charts. The representation must include the input, memory, processing and output aspects of the flow of data
    (0)
  • $3.89
  • + learn more
P4- Specify suitable components to meet user requirements
  • P4- Specify suitable components to meet user requirements

  • Essay • 10 pages • 2017
  • For P4, learners must specify the components to be used to create a computer system for a specified end user. This should include hardware components, any peripherals, software systems, application software and utilities which they would recommend. Evidence for this could be in the form of a presentation, report, video/audio discussion.
    (1)
  • $3.89
  • 1x sold
  • + learn more
M3- Justify that the chosen software meets a given user requirement
  • M3- Justify that the chosen software meets a given user requirement

  • Essay • 3 pages • 2017
  • For merit criterion M3, learners must provide a justification as to why the configuration that they have carried out meets the needs of the specified end user. This could be included as a verbal justification during the video of the customisation, response to questions from the teacher, additional annotation of the screen captures, a presentation or report.
    (0)
  • $3.89
  • + learn more
P5- Connect hardware safely to a computer system, testing for functionality
  • P5- Connect hardware safely to a computer system, testing for functionality

  • Essay • 10 pages • 2017
  • For P5, learners must provide evidence of connecting hardware to a computer system and test the functionality of the system. The learners should connect at least three hardware components, one of which should be internal to the system. The evidence could be in the form of a video, series of annotated photographs or detailed observation of the learner connecting the hardware. The learners should be demonstrating safe working practices. The learners must also include a test plan with the headings ...
    (1)
  • $3.89
  • + learn more
P6- Configure software for a given user requirement
  • P6- Configure software for a given user requirement

  • Essay • 8 pages • 2017
  • For P6, learners must configure at least two pieces of software to meet the needs of a specified user. Evidence could be in the form of a video, detailed observation or annotated screen captures.
    (1)
  • $3.89
  • 1x sold
  • + learn more
P7- Identify potential security risks
  • P7- Identify potential security risks

  • Essay • 4 pages • 2017
  • For P7, learners must identify the potential security risks that can apply to a computer system. The computer system should be the same system that they have been been configuring software on. The evidence could be presented as a recorded discussion, presentation with speaker notes (which could also be videoed) or a report.
    (0)
  • $3.89
  • + learn more
D1- Evaluate any changes to the system
  • D1- Evaluate any changes to the system

  • Essay • 4 pages • 2017
  • For distinction criterion D1, learners should evaluate any changes made to the system and how this meets the needs of the end user and the original specification of the computer system. If learners have not made any changes, then they should evaluate changes which could be made. The evidence could be in the form of an audio recording of a discussion, a video diary, presentation (which could also be videoed) or a report.
    (0)
  • $3.89
  • + learn more