You are on page 1of 27

Grade: 12 Semester: 1st & 2nd

Subject Title: Object-Oriented Programming (JAVA) No. of Hours/School Year: 240 hours

Course Description:

This course is designed to develop & enhance the knowledge, skills, & attitudes of a programmer in accordance with industry standards. It covers the basic, common & core competencies on programming
language, specifically Java. The nominal duration of 240 hours covers the required units at Java Programming NC III. TVET providers can, however, offer a longer, ladderized course covering the basic,
common and core plus specialized competency unit/s.

What to Teach? Why Teach? How to Assess? What to Teach?


Highest Enabling Strategy
Highest Thinking Skill to Use in developing the
Learning competencies
to Assess Highest Thinking Skill to
Assess
Content Flexible
Content Most Essential Topics Performance Standards Assessment
Standards Flexible
KUD KUD Activities Enabling
RBT Learning
Complete Classificatio Most Essential Classificatio (FAA) General
Level Strategies
n n Strategy
Performance (FLS)
Checks

BASIC COMPETENCIES
64 hours

Lead workplace 1.1.Communica Methods of Assessment requires Appropriate U Appropriate U Analyzin Role Play Communicatio Online
communication te information communication: evidence that the communication communication g (Group n discussion
about  Non-verbal gestures candidate: method is method is Meeting/ Self-
workplace  Verbal 1.1. Dealt with a range of selected selected Conference) Learning
processes.  Face to face communication/informatio Multiple Multiple Module
1.2 Lead  Two-way radio n at one time operations operations Brainstormi
workplace  Speaking to groups 1.2. Made constructive involving several involving several ng
discussions.  Using telephone contributions in workplace topics areas are topics areas are
 Written issues communicated communicated
1.3. Sought workplace accordingly accordingly
 Internet
1.3 Identify and issues effectively Questions are Questions are
communicate 1.4. Responded to used to gain used to gain
issues arising in workplace issues promptly extra information extra information
the workplace 1.5. Presented information Correct sources Correct sources
clearly and effectively of information of information
written form are identified are identified
1.6. Used appropriate Information is Information is
sources of information selected and selected and
1.7. Asked appropriate organized organized
questions correctly correctly
1.8. Provided accurate Verbal and Verbal and
information written reporting written reporting
1.9. Organization is undertaken is undertaken
requirements for written when required when required
and electronic Communication Communication
communication methods skills are skills are
1.10. Effective verbal maintained in all maintained in all
communication methods situations situations
1.11. Organize information Response to Response to
1.12. Understand and workplace issues workplace issues
convey intended meaning are sought are sought
1.13. Participate in variety Response to Response to
of workplace discussions workplace issues workplace issues
1.14. Comply with are provided are provided
organization requirements immediately immediately
for the use of written and Constructive Constructive
electronic communication contributions are contributions are
methods made to made to
workplace workplace
discussions on discussions on
such issues as such issues as
production, production,
quality and quality and
safety safety
Goals/objectives Goals/objectives
and action plan and action plan
undertaken in the undertaken in the
workplace are workplace are
communicated communicated
Issues and Issues and
problems are problems are
identified as they identified as they
arise arise
Information Information
regarding regarding
problems and problems and
issues are issues are
organized organized
coherently to coherently to
ensure clear and ensure clear and
effective effective
communication communication
Dialogue is Dialogue is
initiated with initiated with
appropriate appropriate
personnel personnel
1.15. 1.15.
Communication Communication
problems and problems and
issues are raised issues are raised
as they arise as they arise
Lead small 2.1 Provide 1.Work requirements Assessment requires 1.1. Work U 1.1. Work U Analyzin Activity Communicatio Demonstrat
teams team leadership. 1.1. Client Profile evidence that the requirements are requirements are g Planning n ion
2.2 Assign 1.2. Assignment candidate: identified and identified and (Generate a Case
responsibilities instructions 1.1. Maintained or presented to presented to detailed plan studies
among 2.Team member’s improved individuals team members team members for a month) Online
members. concerns and/or team performance 1.2. Reasons for 1.2. Reasons for discussion
Set performance 2.1. Roster/shift details given a variety of possible instructions and instructions and Self-
expectation for 3.Monitor performance scenario requirements are requirements are Learning
team members. 3.1. Formal process 1.2. Assessed and communicated to communicated to Module
2.3 Supervise 3.2. Informal process monitored team and team members team members Brainstormi
team 4.Feedback individual performance 1.3. Team 1.3. Team ng
performance 4.1. Formal process against set criteria members’ members’
4.2. Informal process 1.3. Represented concerns queries and queries and
5.Performance issues of a team and individual to concerns are concerns are
5.1. Work output next level of management recognized, recognized,
5.2. Work quality or appropriate specialist discussed and discussed and
5.3. Team participation and to negotiate on their dealt with dealt with
5.4. Compliance with behalf 1.4. Duties, and 1.4. Duties, and
workplace protocols 1.4. Allocated duties and responsibilities responsibilities
5.5. Safety responsibilities, having are allocated are allocated
5.6. Customer service regard to individual’s having regard to having regard to
knowledge, skills and the skills, the skills,
aptitude and the needs of knowledge and knowledge and
the tasks to be performed aptitude required aptitude required
1.5. Set and communicated to properly to properly
performance expectations undertake the undertake the
for a range of tasks and assigned task assigned task and
duties within the team and and according to according to
provided feedback to team company policy company policy
members 1.5. Duties are 1.5. Duties are
1.6. Company policies and allocated having allocated having
procedures regard to regard to
1.7. Relevant legal individual individual
requirements preference, preference,
1.8. How performance domestic and domestic and
expectations are set personal personal
1.9. Methods of considerations, considerations,
Monitoring Performance whenever whenever
1.10.Client expectations possible possible
1.11.Team member’s 1.6.Performance 1.6.Performance
duties and responsibilities expectations are expectations are
1.12. Communication established established based
skills required for leading based on client on client needs
teams needs and and according to
1.13.Informal performance according to assignment
counseling skills assignment requirements
1.14. Team building skills requirements 1.7.Performance
1.15. Negotiating skills 1.7.Performance expectations are
expectations are based on
based on individual team
individual team members duties
members duties and area of
and area of responsibility
responsibility 1.8.Performance
1.8.Performance expectations are
expectations are discussed and
discussed and disseminated to
disseminated to individual team
individual team members
members 1.9.Monitoring
1.9.Monitoring of performance
of performance takes place
takes place against defined
against defined performance
performance criteria and/or
criteria and/or assignment
assignment instructions and
instructions and corrective action
corrective action taken if required
taken if required 1.10.Team
1.10.Team members are
members are provided with
provided with feedback,
feedback, positive support
positive support and advice on
and advice on strategies to
strategies to overcome any
overcome any deficiencies
deficiencies 1.11.Performanc
1.11.Performanc e issues which
e issues which cannot be
cannot be rectified or
rectified or addressed within
addressed within the team are
the team are referenced to
referenced to appropriate
appropriate personnel
personnel according to
according to employer policy
employer policy 1.12.Team
1.12.Team members are
members are kept informed of
kept informed of any changes in
any changes in the priority
the priority allocated to
allocated to assignments or
assignments or tasks which
tasks which might impact on
might impact on client/customer
client/customer needs and
needs and satisfaction
satisfaction 1.13.Team
1.13.Team operations are
operations are monitored to
monitored to ensure that
ensure that employer/client
employer/client needs, and
needs, and requirements are
requirements are met
met 1.14. Follow-up
1.14. Follow-up communication
communication is provided on all
is provided on issues affecting
all issues the team
affecting the 1.15. All relevant
team documentation is
1.15. All completed in
relevant accordance with
documentation is company
completed in procedures
accordance with
company
procedures
Develop and 3.1 Identify 1.Preparing for Assessment requires 1.1Information U 1.1Information U Evaluatin Role Play Reasoning and Online
practice relevant negotiation evidence that the on preparing for on preparing for g (Negotiation Proof discussion
negotiation skills information in 1.1. Background candidate: negotiation is negotiation is s) Self-
planning information on other 1.1. Demonstrated enough identified and identified and Learning
negotiations parties to the knowledge of the factors included in the included in the Module
3.2 Participate negotiation influencing negotiation to plan plan Brainstormi
in negotiations 1.2. Good achieve agreed outcome 1.2.Information 1.2.Information ng
3.3 Document understanding of topic 1.2. Participated in on creating non- on creating non-
areas for to be negotiated negotiation with at least verbal verbal
agreement 1.3. Clear one person to achieve an environments for environments for
understanding of agreed outcome positive positive
desired outcome/s negotiating is negotiating is
1.4. Personal attributes 2.1. Codes of practice and identified and identified and
1.4.1. Self-awareness guidelines for the included in the included in the
1.4.2. Self esteem organization plan plan
2.2. Organizations policy 1.3.Information 1.3.Information
1.4.3. Objectivity
and procedures for on active on active
1.4.4. Empathy
negotiations listening is listening is
1.4.5. Respect for identified and identified and
2.3. Decision making and
others included in the included in the
conflict resolution
1.5. Interpersonal skills strategies procedures plan plan
1.5.1. 2.4. Problem solving 1.4Information 1.4Information
Listening/reflecting strategies on how to deal on different on different
1.5.2. Non-verbal with unexpected questions questioning questioning
communication and attitudes during techniques is techniques is
1.5.3. Assertiveness negotiation identified and identified and
1.5.4. Behavior 2.5. Flexibility included in the included in the
labeling 2.6. Empathy plan plan
1.5.5Testing 1.5.Information 1.5.Information
understanding 3.1. Interpersonal skills to is checked to is checked to
1.5.6. Seeking develop rapport with other ensure it is ensure it is
information parties correct and up to correct and up to
3.2. Communication skills date date
1.5.7. Self-disclosing
(verbal and listening) 2.1 Criteria for 2.1 Criteria for
1.6. Analytic skills
3.3. Observation skills successful successful
1.6.1. Observing outcome are outcome are
3.1. Negotiation skills
differences between agreed upon by agreed upon by
content and process all parties all parties
1.6.2. Identifying 2.2Desired 2.2Desired
bargaining information outcome of all outcome of all
1.6.3Applying parties are parties are
strategies to manage considered considered
process 2.3.Appropriate 2.3.Appropriate
1.6.4. Applying steps language is used language is used
in negotiating process throughout the throughout the
1.6.5. Strategies to negotiation negotiation
manage conflict 2.4 A variety of 2.4 A variety of
1.6.6. Steps in questioning questioning
negotiating process techniques are techniques are
1.6.7options within used used
organization and 2.5 The issues 2.5 The issues
externally for resolving and processes and processes are
conflict are documented documented and
and agreed upon agreed upon by
2.Non-verbal by all parties all parties
environments 2.6. Possible 2.6. Possible
2.1. Friendly reception solutions are solutions are
2.2. Warm and discussed, and discussed, and
welcoming room their viability their viability
2.3. Refreshments assessed assessed
offered 2.7 Areas for 2.7 Areas for
agreement are agreement are
2.4. Lead in
confirmed and confirmed and
conversation before
recorded recorded
negotiation begins
2.8 Follow-up 2.8 Follow-up
action is agreed action is agreed
3. Active listening upon by all upon by all
3.1. Attentive parties parties
3.2. Don’t interrupt
3.3. Good posture
3.4. Maintain eye
contact
3.5. Reflective
listening

4.Questioning
techniques
4.1. Direct
4.2. Indirect
4.3. Open-ended

Solve workplace 4.1 Explain the 1.Analytical Assessment requires 1.1. Variances K 1.1. Variances K Understa Situational Representation Written test
problem related analytical techniques evidence that the are identified are identified nding Role Play Practical/
to work activities techniques. 1.1. Brainstorming candidate: from normal from normal (Problem performanc
4.2 Identify the 1.2. Intuitions/Logic 1.1.Identified the problem operating operating Solving) e test
problem. 1.3. Cause and effect 1.2.Determined the parameters; and parameters; and Online
4.3 Determine diagrams fundamental causes of the product quality product quality discussion
the possible 1.4. Pareto analysis problem 1.2. Extent, 1.2. Extent, Self-
cause/s of the 1.5.WOT analysis 1.3.Determined the correct cause and nature cause and nature Learning
problem. / preventive action are of the are of the Module
1.6. Gant chart, Pert
1.4.Provided problem are problem are Brainstormi
CPM and graphs
recommendation to defined through defined through ng
1.7. Scatter grams
manager observation, observation,
2.Problem These aspects may be best investigation and investigation and
2.1. Non – routine assessed using a range of analytical analytical
process and quality scenarios / case studies / techniques techniques
problems what ifs as a stimulus with 1.3. Problems 1.3. Problems are
2.2. Equipment a walk-through forming are clearly stated clearly stated and
selection, availability part of the response. These and specified specified
and failure assessment activities 1.4. Possible 1.4. Possible
2.3. Teamwork and should include a range of causes are causes are
work allocation problems, including new, identified based identified based
problem unusual and improbable on experience on experience
2.4. Safety and situations that may have and the use of and the use of
emergency situations happened. problem-solving problem-solving
and incidents 1.5. Competence includes tools / analytical tools / analytical
a thorough knowledge and techniques. techniques.
3.Action plans understanding of the 1.5. Possible 1.5. Possible
3.1. Priority process, normal operating cause statements cause statements
requirements parameters, and product are developed are developed
3.2. Measurable quality to recognize non- based on based on
objectives standard situations findings findings
3.3. Resource 1.6. Competence to 1.6.Fundamental 1.6.Fundamental
requirements include the ability to apply causes are causes are
and explain, enough for identified per identified per
3.4. Timelines
the identification of results of results of
3.5. Co-ordination and fundamental cause, investigation investigation
feedback requirements determining the corrective conducted conducted
3.6. Safety action and provision of 1.7. All possible 1.7. All possible
requirements recommendations options are options are
3.7. Risk assessment 1.6.1. Relevant equipment considered for considered for
3.8. Environmental and operational processes resolution of the resolution of the
requirements 1.6.2. Enterprise goals, problem problem
targets and measures 1.8. Strengths 1.8. Strengths
1.6.3. Enterprise quality, and weaknesses and weaknesses
OHS and environmental of possible of possible
requirement options are options are
1.6.4. Principles of considered considered
decision-making strategies 1.9. Corrective 1.9. Corrective
and techniques actions are actions are
1.6.5. Enterprise determined to determined to
information systems and resolve the resolve the
data collation problem and problem and
1.6.6. Industry codes and possible future possible future
standards causes causes
1.7. Using range of formal 1.10. Action 1.10. Action
problem-solving plans are plans are
techniques developed developed
1.8. Identifying and identifying identifying
clarifying the nature of the measurable measurable
problem objectives, objectives,
1.9. Devising the best resource needs resource needs
solution and timelines in and timelines in
1.10. Evaluating the accordance with accordance with
solution safety and safety and
1.11.Implementation of a operating operating
developed plan to rectify procedures procedures
the problem 1.11. Report on 1.11. Report on
recommendation recommendation
s are prepared s are prepared
1.12.Recommen 1.12.Recommen
dations are dations are
presented to presented to
appropriate appropriate
personnel. personnel.
1.13.Recommen 1.13.Recommen
dations are dations are
followed-up, if followed-up, if
required required
Use 5.1 Identify 1.Mathematical Assessment requires 1.1Problem areas U 1.1Problem areas U Applying Situational Connections Online
mathematical mathematical techniques evidence that the are identified are identified Role Play discussion
concepts and tools and May include but are candidate: based on given based on given (Problem Self-
techniques techniques to not limited to: 1.1 Identified, applied and condition condition Solving) Learning
solve problem 1.1Four fundamental reviewed the use of 1.2.Mathematica 1.2.Mathematical Module
5.2 Apply operations mathematical concepts and l techniques are techniques are Brainstormi
mathematical techniques to workplace selected based selected based on ng
procedures/solut 1.2Measurements problems on the given the given
ion 1.3Use/Conversion of problem problem
5.3 Analyze units of measurements 2.1 Fundamental operation
results 1.4. Use of standard (addition, subtraction, 2.1.Mathematica 2.1.Mathematical
formulas division, multiplication) l techniques are techniques are
2.Appropriate action 2.2 Measurement system applied based on applied based on
2.1 Review in the use 2.3 Precision and accuracy the problem the problem
of mathematical 2.4 Basic measuring identified identified
techniques (e.g. tools/devices 2.2.Mathematica 2.2.Mathematical
recalculation, re- l computations computations are
modeling) 3.1 Applying mathematical are performed to performed to the
2.2 Report error to computations the level of level of accuracy
immediate superior for 3.2 Using calculator accuracy required for the
proper action 3.3Using different required for the problem
measuring tools problem 2.3 Results of
The following resources 2.3 Results of mathematical
MUST be provided: mathematical computation is
4.1 Calculator computation is determined and
4.2 Basic measuring tools determined and verified based on
4.3 Case Problems verified based on job requirements
job requirements
3.1 Result of
3.1 Result of application is
application is reviewed based
reviewed based on expected and
on expected and required
required specifications
specifications and outcome
and outcome 3.2.Appropriate
3.2.Appropriate action is applied
action is applied in case of error
in case of error

Use relevant 6.1 Identify 1.Technology Assessment requires 1.1. Usage of U 1.1. Usage of U Applying Case Study Connections Online
technologies appropriate May include but are evidence that the different different (Use of discussion
technology not limited to: candidate: technologies is technologies is technology Self-
6.2 Apply 1.1Office technology 1.1 Studied and selected determined determined for Office Learning
relevant 1.2Industrial appropriate technology based on job based on job Productivity Module
technology technology consistent with work requirements requirements ) Brainstormi
6.3 Maintain/ 1.3System technology requirements 1.2. Appropriate 1.2. Appropriate ng
enhance 1.4Information 1.2 Applied relevant technology is technology is
relevant technology technology selected as per selected as per
technology 1.5Training technology 1.3Maintained and work work
2.Management enhanced operative ability specification specification
concepts of relevant technology 2.1. Relevant 2.1. Relevant
May include but not technology is technology is
limited to: 2.1Awareness on effectively used effectively used
2.1Real Time technology and its function in carrying out in carrying out
Management 2.2 Repair and function function
2.2 KAIZEN or maintenance procedure 2.2. Applicable 2.2. Applicable
continuous 2.3 Operating instructions software and software and
improvement 2.4 Applicable software hardware are hardware are
2.3. 5s 2.5 Communication used as per task used as per task
2.4. Total Quality techniques requirement requirement
Management 2.6 Health and safety 2.3.Management 2.3.Management
2.5. Other procedure concepts are concepts are
management/productiv 2.7 Company policy in observed and observed and
ity tools relation to relevant practiced as per practiced as per
3.Industry standard technology established established
operating procedure 2.8 Different management industry industry
3.1Written guidelines concepts practices practices
relative to the usage of 2.9 Technology 3.1.Maintenance 3.1.Maintenance
office adaptability of technology is of technology is
technology/equipment applied in applied in
3.2. Verbal 3.1 Relevant technology accordance with accordance with
advise/instruction from application/implementatio the industry the industry
the co-worker n standard standard
4.Manufacturer’s 3.2 Basic communication operating operating
operating guidelines/ skills procedure, procedure,
instructions 3.3 Software applications manufacturer’s manufacturer’s
4.1. Written skills operating operating
instruction/manuals of 3.4 Basic troubleshooting guidelines and guidelines and
specific technology/ skills occupational occupational
equipment health and safety health and safety
4.2General instruction procedure to procedure to
manual ensure its ensure its
4.3. Verbal advise operative ability operative ability
from manufacturer 3.2. Updating of 3.2. Updating of
relative to the technology is technology is
operation of equipment maintained maintained
through through
5.Occupational health continuing continuing
and safety procedure education or education or
5.1 Relevant statutes training in training in
on OHS accordance with accordance with
5.2Company job requirement job requirement
guidelines in using 3.3. Technology 3.3. Technology
technology/equipment failure/ defect is failure/ defect is
immediately immediately
6.Appropriate action reported to the reported to the
6.1 Implementing concern/ concern/
preventive responsible responsible
maintenance schedule person or section person or section
6.2. Coordinating with for appropriate for appropriate
manufacturer’s action action
technician
COMMON COMPETENCIES
16 hrs.

Apply Quality 1.1 Assess 1Materials Assessment must show 1.1.Requirement U 1.1.Requirement U Applying Workplace Connections Demonstrat
Standards quality of 1.1Materials may that the candidate: s of task are s of task are Operation ion &
received include but not limited 1.1. Carried out work in determined in determined in (List of questioning
materials to: accordance with the accordance with accordance with workplace Observation
1.2 Assess own 1.1.1. Manuals company’s standard the required the required Standard &
work 1.1.2. Job orders operating procedures output. output. Operation questioning
1.3 Engage in 1.1.3. Instructional 1.2. Performed task 1.2.Appropriate 1.2.Appropriate Procedure) Third party
quality videos according to specifications hardware and hardware and report
improvement 2. Faults 1.3. Reported defects software are software are Online
2.1Faults may include detected in accordance selected selected discussion
but not limited to: with standard operating according to task according to task Self-
2.1.1. Materials not to procedures assigned and assigned and Learning
specification 1.4. Carried out work in required required Module
2.1.2. Materials accordance with the outcome. outcome. Brainstormi
contain process improvement 1.3. Task is 1.3. Task is ng
incorrect/outdated procedures planned to planned to
information 1.5. Relevant production ensure that OH ensure that OH
2.1.3. Hardware processes, materials and & S guidelines & S guidelines
defects products and procedures and procedures
2.1.4. Materials that do 1.6. Characteristics of are followed. are followed.
not conform with any materials, software and 1.4. Client - 1.4. Client -
regulatory agencies hardware used in specific specific
3Documentation production processes guidelines and guidelines and
3.1. Organization work 1.7. Quality checking procedures are procedures are
procedures procedures followed. followed.
3.2. Manufacturer’s 1.8. Workplace procedures 1.5. Required 1.5. Required
instruction manual 1.9. Safety and data security data security
3.3. Customer environmental aspects of guidelines are guidelines are
requirements production processes applied in applied in
3.4. Forms 1.10. Fault identification accordance with accordance with
4. Errors and reporting existing existing
4.1. Errors may be 1.11. Quality improvement procedures. procedures.
related but not limited processes 1.6. Data are 1.6. Data are
to the following: 1.12. Reading skills entered into the entered into the
4.1.1. Deviation from required to interpret work computer using computer using
the requirements of the instruction appropriate appropriate
Client 1.13. Communication program/applicat program/applicat
4.1.2. Deviation from skills needed to interpret ion in ion in
the requirement of the and apply defined work accordance with accordance with
organization procedures company company
5.Quality standards 1.14. Carry out work in procedures. procedures.
5.1. Quality standards accordance with OHS 1.7. Accuracy of 1.7. Accuracy of
may be related but not policies and procedures information is information is
limited to the 1.15. Critical thinking checked, and checked, and
following: 1.16. Solution providing information is information is
5.1.1. Materials and decision-making saved in saved in
5.1.2. Hardware accordance with accordance with
5.1.3. Final product standard standard
5.1.4. Production operating operating
processes procedures. procedures.
5.1.5. Customer 1.8. Inputted 1.8. Inputted data
service data is stored in is stored in
6Customer storage media storage media
6.1Co-worker according to according to
6.2Supplier/Vendor requirements. requirements.
6.3Client 1.9. Work is 1.9. Work is
6.4Organization performed performed within
receiving the product within ergonomic
or service ergonomic guidelines.
guidelines. 1.10. Correct
1.10. Correct program/applicat
program/applicat ion is selected
ion is selected based on job
based on job requirements.
requirements. 1.11. Program
1.11. Program /application
/application containing the
containing the information
information required is
required is accessed
accessed according to
according to company
company procedures.
procedures. 1.12. Desktop
1.12. Desktop icons are
icons are correctly
correctly selected, opened
selected, opened and closed for
and closed for navigation
navigation purposes.
purposes. 1.13. Keyboard
1.13. Keyboard techniques are
techniques are carried out in
carried out in line with OH &
line with OH & S requirements
S requirements for safe use of
for safe use of keyboards. 1.1.
keyboards. 1.1. Entered data are
Entered data are processed using
processed using appropriate
appropriate software
software commands.
commands. 1.2. Data are
1.2. Data are printed out as
printed out as required using
required using computer
computer hardware
hardware /peripheral
/peripheral devices in
devices in accordance with
accordance with standard
standard operating
operating procedures.
procedures. 1.3. Files and
1.3. Files and data are
data are transferred
transferred between
between compatible
compatible systems using
systems using computer
computer software,
software, hardware/periphe
hardware/periph ral devices in
eral devices in accordance with
accordance with standard
standard operating
operating procedures.
procedures. 1.4.Information
1.4.Information requirements for
requirements for internet search
internet search are established.
are established. 1.5. Browser is
1.5. Browser is launched.
launched. 1.6. Search
1.6. Search engine is loaded.
engine is loaded. 1.7.Appropriate
1.7.Appropriate search criteria/or
search criteria/or URL of site is
URL of site is entered.
entered. 1.8. Relevant
1.8. Relevant links are
links are followed to
followed to locate required
locate required information.
information. 1.9. Useful pages
1.9. Useful pages are bookmarked
are bookmarked or printed as
or printed as required.
required. 1.10.Procedures
1.10.Procedures for ensuring
for ensuring security of data,
security of data, including regular
including regular back-ups and
back-ups and virus checks are
virus checks are implemented in
implemented in accordance with
accordance with standard
standard operating
operating procedures.
procedures. 1.11. Basic file
1.11. Basic file maintenance
maintenance procedures are
procedures are implemented in
implemented in line with the
line with the standards
standards operating
operating procedures.
procedures.
Operate a 2.1 Plan and 1.Hardware and Assessment must show 1.1.Requirement D 1.1.Requirement D Creating Identificati Problem Demonstrat
Personal prepare for task peripheral devices that the candidate: s of task are s of task are on Solving ion &
Computer to be 1.1. Personal 1.1. Selected and used determined in determined in (Identify the questioning
undertaken computers hardware components accordance with accordance with parts of a Observation
2.2 Input data 1.2. Networked correctly and according to the required the required Personal &
into computer systems the task requirement output. output. Computer questioning
2.3 Access 1.3. Communication 1.2. used basic software 1.2.Appropriate 1.2.Appropriate and their Third party
information equipment applications to create new hardware and hardware and function) report
using computer 1.4. Printers files and documents software are software are Assessment
2.4 Produce 1.5. Scanners 1.3. Produced accurate and selected selected of output
output/data 1.6. Keyboard complete data in according to task according to task product
using computer 1.7. Mouse accordance with the assigned and assigned and Portfolio
system 1.8. Voice/Data logger requirements required required Computer-
2.5 Use basic 2.Software 1.4. Used appropriate outcome. outcome. based
functions of a Software includes the devices and procedures to 1.3.Task is 1.3.Task is assessment
web browser to following but not transfer files/data planned to planned to
locate limited to: accurately ensure that OH ensure that OH
information 2.1 Word processing 1.5. Used basic functions & S guidelines & S guidelines
2.6 Maintain packages of a www-browser to and procedures and procedures
computer 2.2Database packages locate information. are followed. are followed.
equipment and 2.3Internet 1.6. Basic ergonomics of 1.4.Client - 1.4.Client -
systems 2.4Spreadsheets keyboard and computer specific specific
2.5Client Specific user guidelines and guidelines and
Software 1.7. Main types of procedures are procedures are
3OH & S guidelines computers and basic followed. followed.
3.1.OHS guidelines features of different 1.5.Required 1.5.Required
3.2. Enterprise operating systems data security data security
procedures 1.8. Main parts of a guidelines are guidelines are
4.Storage media computer applied in applied in
Storage media include 1.9. Storage devices and accordance with accordance with
the following but not basic categories of existing existing
limited to: memory procedures. procedures.
4.1. Diskettes 1.10. Relevant types of 1.6.Data are 1.6.Data are
4.2. CDs software entered into the entered into the
4.3. Zip disks 1.11. General security, computer using computer using
4.4. hard disk drives, privacy legislation and appropriate appropriate
local and remote copyright program/applicat program/applicat
4.5. Optical drives 1.12. Viruses ion in ion in
5.Ergonomic 1.13. OH & S principles accordance with accordance with
guidelines and responsibilities company company
5.1. Types of 1.14. Calculating computer procedures. procedures.
equipment used capacity 1.7. Accuracy of 1.7. Accuracy of
5.2. Appropriate 1.15. Productivity information is information is
furniture Application checked, and checked, and
5.3. Seating posture 1.16. Business Application information is information is
5.4. Lifting posture 1.17. System Software saved in saved in
5.5. Visual display unit 1.18. Reading and accordance with accordance with
screen brightness comprehension skills standard standard
6.Desktop icons required to interpret work operating operating
6.1. Icons include the instruction and to interpret procedures. procedures.
following but not basic user manuals. 1.8. Inputted 1.8. Inputted data
limited to: 1.19. Communication data is stored in is stored in
6.2. Directories/folders skills to identify lines of storage media storage media
6.3. Files communication, request according to according to
6.4. Network devices advice, follow instructions requirements. requirements.
6.5. Recycle bin and receive feedback. 1.9. Work is 1.9. Work is
6.6. Program icons 1.20. Technology skills to performed performed within
7.Maintenance use equipment safely within ergonomic
7.1. Creating and including keyboard skills. ergonomic guidelines.
managing more space The assessor may select guidelines. 1.10. Correct
in the hard disk and two of the following 1.10. Correct program/applicat
other peripherals assessment methods to program/applicat ion is selected
7.2. Reviewing objectively assess the ion is selected based on job
programs candidate: based on job requirements.
7.3. Deleting unwanted 1.21. Direct Observation requirements. 1.11.
files and Oral Questioning 1.11. Program/applicat
7.4. Backing up files 1.22. Practical Program/applicat ion containing
7.5. Checking hard demonstration ion containing the information
drive for errors 1.23. Computer hardware the information required is
7.6. Using up to date with peripherals required is accessed
anti-virus programs 1.24. Appropriate software accessed according to
7.7. Cleaning dust 1.25. Assessment may be according to company
from internal and conducted in the company procedures.
external surfaces workplace or in a procedures. 1.12. Desktop
simulated environment 1.12. Desktop icons are
icons are correctly
correctly selected, opened
selected, opened and closed for
and closed for navigation
navigation purposes.
purposes. 1.13. Keyboard
1.13. Keyboard techniques are
techniques are carried out in
carried out in line with OH &
line with OH & S requirements
S requirements for safe use of
for safe use of keyboards.
keyboards. 1.1. Entered data
1.1. Entered data are processed
are processed using appropriate
using software
appropriate commands.
software 1.2. Data are
commands. printed out as
1.2. Data are required using
printed out as computer
required using hardware
computer /peripheral
hardware devices in
/peripheral accordance with
devices in standard
accordance with operating
standard procedures.
operating 1.3. Files and
procedures. data are
1.3. Files and transferred
data are between
transferred compatible
between systems using
compatible computer
systems using software,
computer hardware/periphe
software, ral devices in
hardware/periph accordance with
eral devices in standard
accordance with operating
standard procedures.
operating 1.4. Information
procedures. requirements for
1.4. Information internet search
requirements for are established.
internet search 1.5. Browser is
are established. launched.
1.5. Browser is 1.6. Search
launched. engine is loaded.
1.6. Search 1.7. Appropriate
engine is loaded. search criteria/or
1.7. Appropriate URL of site is
search criteria/or entered.
URL of site is 1.8. Relevant
entered. links are
1.8. Relevant followed to
links are locate required
followed to information.
locate required 1.9. Useful pages
information. are bookmarked
1.9. Useful pages or printed as
are bookmarked required.
or printed as 1.10. Procedures
required. for ensuring
1.10. Procedures security of data,
for ensuring including regular
security of data, back-ups and
including regular virus checks are
back-ups and implemented in
virus checks are accordance with
implemented in standard
accordance with operating
standard procedures.
operating 1.11. Basic file
procedures. maintenance
1.11. Basic file procedures are
maintenance implemented in
procedures are line with the
implemented in standards
line with the operating
standards procedures.
operating
procedures.
CORE COMPETENCIES
160 hours

Perform object- 1.1 Apply 1. Executable Java Assessment requires 1.1. Executable D 1.1. Executable D Creating Programmi Problem Online
oriented analysis basics of Java applications evidence that the Java applications Java applications ng Activity Solving discussion
and design in language •Hello World candidate: are created in are created in (Develop a Self-
Java technology 1.2 Work with 1.1 Applied Basics of accordance with accordance with program that Learning
•Hello with name
Java language
methods and •Hello with name and Java framework Java framework adheres with Module
1.2 Worked with
encapsulation date Methods and 1.2 Java 1.2 Java the best Brainstormi
1.3 Work with 1. Working with Java Encapsulation packages are packages are practices) ng
inheritance and Data Types 1.3 Worked with imported to imported to
handling •Declare and initialize Inheritance and Handling make them make them
exceptions. variables Exceptions accessible in the accessible in the
1.4 Examine 1.4 Use object-oriented code code
•Differentiate between
object-oriented technologies and perform 1.3 Working 1.3 Working
object references and object-oriented analysis
concepts and primitive variables with Java Data with Java Data
terminology and design. types is types is
•Read and write to 1.5 Follow a software
1.5 Explain demonstrated in demonstrated in
object fields development process using
modeling and accordance with accordance with
•Explain an object’s an OO software project.
software Java framework Java framework
development lifecycle (creation, 1.6 Use the widely adopted 1.4 Using 1.4 Using
process dereference, and graphical modeling Operators and Operators and
1.6 Create Use garbage collection) language - the Unified Decision Decision
Case Diagrams •Call methods on Modeling Language Constructs is Constructs is
(UML) version 2.2.
and Use Case objects demonstrated in demonstrated in
1.7 Manage complexity of
Scenarios •Manipulate data using artifacts; describe the accordance with accordance with
1.7 Transition StringBuilder class and problem and proposed Java framework Java framework
analysis to its methods solution. 1.5 Creating and 1.5 Creating and
design using •Create and manipulate Using Arrays is Using Arrays is
Interaction Strings 2.1. Uses of various Java demonstrated in demonstrated in
Diagrams 2. Using Operators and programming language accordance with accordance with
1.8 Introduce Decision Constructs constructs to create several Java framework Java framework
Architectural •Use Java operators Java technology 1.6 Using Loop 1.6 Using Loop
Concepts and applications Constructs is Constructs is
•Use parenthesis to
Architecture  Define the scope of demonstrated in demonstrated in
override operator
Tiers Diagrams variables accordance with accordance with
precedence  Define the structure of a
•Test equality between Java framework Java framework
Java class 2.1 Methods 2.1 Methods
strings and other  Differentiate between
objects using == and with arguments with arguments
default and user-defined
equals() constructors and return values and return values
•Create and use if-else 2.2. Uses of decision and are created in are created in
constructs looping constructs and accordance with accordance with
methods to dictate Java framework Java framework
•Use a switch
program flow 2.2 Static 2.2 Static
statement
2.3. Basic error handling keywords are keywords are
3. Creating and Using for your Java technology applied to applied to
Arrays programs methods and methods and
•Declare, initialize, and 2.4. Intermediate Java fields in fields in
use a one-dimensional programming and object- accordance with accordance with
array oriented (OO) concepts in
Java framework Java framework
•Declare, initialize, and Java technology programs
2.3 Overloaded 2.3 Overloaded
use a multi-  Determine the effect
upon object references method is method is
dimensional array created in created in
and primitive values
•Declare and use an accordance with accordance with
when they are passed
ArrayList into methods that Java framework Java framework
4. Using Loop change the values 2.4 Access 2.4 Access
Constructs  Differentiate between modifiers are modifiers are
•Create and use while the type of a reference applied in applied in
loops and the type of an accordance with accordance with
•Create and use for object Determine when Java framework Java framework
loops including the casting is necessary 2.5 2.5
enhanced for loop 2.5. Java technology and
Encapsulation Encapsulation
the Java programming
•Create and use do- language principled are principled are
while loops 2.6. Understanding of applied to a class applied to a class
•Compare loop basic object-oriented in accordance in accordance
constructs concepts such as with Java with Java
•Use break and inheritance, encapsulation, framework framework
continue and abstraction 3.1 Inheritance is 3.1 Inheritance is
2.7. Uses and manipulation implemented in implemented in
5. OOSD Workflows of object references to accordance with accordance with
•Requirements write simple error handling Java framework Java framework
Gathering code 3.2 Code that 3.2 Code that
•Requirements  Differentiate among demonstrates the demonstrates the
checked exceptions, use of use of
Analysis, RuntimeExceptions,
• Architecture and polymorphism is polymorphism is
and Error
Design,  Describe what developed in developed in
Implementation exceptions are used for accordance with accordance with
•Testing & in Java Java framework Java framework
Deployment  Invoke a method that 3.3 Super and 3.3 Super and
6. Defining throws an Exception this syntax are this syntax are
Architecture Tiers  Recognize common used to access used to access
•Describe the concepts exception classes and objects and objects and
categories constructors in constructors in
of the Client and
2.8 Recognize and accordance with accordance with
Presentation tiers document use case
•Describe the concepts Java framework Java framework
dependencies using UML 3.4 Abstract 3.4 Abstract
of the Business tier notation for extends,
classes and classes and
•Describe the concepts includes, and
generalization interfaces are interfaces are
of the Resource and
2.9 Describe how to used in used in
Integration tiers
manage the complexity of accordance with accordance with
•Describe the concepts
Use Case Diagrams by Java framework Java framework
of the Solution model
creating UML packaged 3.5 How 3.5 How
views Identify and exceptions alter exceptions alter
document scenarios for a normal program normal program
use case flow are flow are
2.10 Describe how to determined by determined by
reference included and creating a try- creating a try-
extending use cases
2.11 Identify and catch block. catch block.
document non-functional 4.1 Important 4.1 Important
requirements (NFRs), object-oriented object-oriented
business rules, risks, and (OO) concepts (OO) concepts
priorities for a use case are described in are described in
2.12 Identify the purpose accordance with accordance with
of a Supplementary Java framework Java framework
Specification Document 4.2 Fundamental 4.2 Fundamental
2.13 Identify the essential OO terminology OO terminology
elements in an Activity are defined in are defined in
diagram
accordance with accordance with
3.1.Basic computer
operation skills Java framework Java framework
3.2.Logic analysis 5.1 Object- 5.1 Object-
3.3.Communication skills Oriented Oriented
3.4.Code writing and Software Software
debugging skills Development Development
(OOSD) process (OOSD) process
is explained in is explained in
accordance with accordance with
Java framework Java framework
5.2 Benefits of 5.2 Benefits of
modeling modeling
software are software are
explained in explained in
accordance with accordance with
Java framework Java framework
5.3 Purpose, 5.3 Purpose,
activities, and activities, and
artifacts of the artifacts of the
following OOSD following OOSD
workflows workflows
(disciplines) are (disciplines) are
explained explained
6.1 The need for 6.1 The need for
a Use Case a Use Case
Diagram is Diagram is
justified in justified in
accordance with accordance with
Java framework Java framework
6.2 Use Case 6.2 Use Case
Diagram for a Diagram for a
software system software system
is developed is developed
based on the based on the
goals of the goals of the
business owner business owner
6.3 Use Case 6.3 Use Case
Diagrams is Diagrams is
developed based developed based
on the goals of on the goals of
all the all the
stakeholders stakeholders
6.4 Use Case 6.4 Use Case
form is created form is created
describing a describing a
summary of the summary of the
scenarios in the scenarios in the
main and main and
alternate flows alternate flows
7.1 Purpose and 7.1 Purpose and
elements of the elements of the
Design model Design model
are explained in are explained in
accordance with accordance with
Java framework Java framework
7.2 Essential 7.2 Essential
elements of a elements of a
UML UML
Communication Communication
diagram are diagram are
identified in identified in
accordance with accordance with
Java framework Java framework
7.3 7.3
Communication Communication
diagram view of diagram view of
the Design the Design
model is created model is created
in accordance in accordance
with Java with Java
framework framework
7.4 Sequence 7.4 Sequence
diagram view of diagram view of
the Design the Design
model is created model is created
in accordance in accordance
with Java with Java
framework framework
8.1 Difference 8.1 Difference
between between
architecture and architecture and
design is design is
distinguished in distinguished in
accordance with accordance with
Java framework Java framework
8.2 Tiers, layers, 8.2 Tiers, layers,
and systemic and systemic
qualities are qualities are
described in described in
accordance with accordance with
Java framework Java framework
8.3 Architecture 8.3 Architecture
workflow is workflow is
described in described in
accordance with accordance with
Java framework Java framework
8.4 Architecture 8.4 Architecture
Tiers are defined Tiers are defined
in accordance in accordance
with Java with Java
framework framework
Create and fine 2.1 Apply 1. Access Modifier Assessment requires 1.1 Access D 1.1 Access D Creating Programmi Problem Online
tune Java Basics of Java •private, evidence that the modifiers are modifiers are ng Activity Solving discussion
technology Class Design •protected, candidate: used in used in (Develop a Self-
applications 2.2 Apply Java 1.1 Performed multiple accordance with accordance with program that Learning
•public operations on database
using object- Advance Class 2. Object Class Java framework Java framework adheres with Module
tables, including creating,
oriented Design and •(hashCode(), reading, updating and 1.2 Instance of 1.2 Instance of the best Brainstormi
programming Object-Oriented deleting using JDBC operator and operator and practices) ng
•equals(),
concept Design casting are used casting are used
Principles •toString()) technology in accordance in accordance
2.3 Apply string 2Object Oriented 1.2 Process strings using with Java with Java
processing, Design Principles a variety of regular framework framework
exceptions and expressions and create 1.3 Virtual 1.3 Virtual
•Choose between
high-performing multi-
assertions interface inheritance method method
threaded applications that
2.4 Build and class inheritance avoid deadlock invocation is invocation is
database •Develop code that 1.3 Implement used in used in
applications implements IS-A input/output (I/O) accordance with accordance with
with JDBC and/or HAS-A functionality to read from Java framework Java framework
2.5 Monitor relationships (apply and write to data and text 1.4 Override 1.4 Override
operating high cohesion and low files and understand methods from methods from
system coupling principles) advanced I/O streams the Object class the Object class
performance •Apply object 1.4 Create Java are used to are used to
2.6 Work with technology applications improve the improve the
composition principles
language level that leverage the object- functionality of functionality of
(including HAS-A oriented features of the
concerns and relationships) class class
Java language, such as
garbage •Design a class using encapsulation, inheritance, 1.1Package and 1.1Package and
collection the Singleton design and polymorphism import import
2.7 Work with pattern 1.5 Set up a performance- statements are statements are
performance •Write code to tuning environment used in used in
tuning at the implement the Data 1.1 Monitor Java accordance with accordance with
language level Access Object (DAO) applications Java framework Java framework
pattern 1.2 Apply rigor to the task 2.1 Proper use of 2.1 Proper use of
of performance tuning when and how to when and how to
•Design and create 1.3 Use various tools and
objects using a apply abstract apply abstract
mechanisms for classes is classes is
Factory, and use monitoring, profiling and
factories from the API tuning Java applications identified identified
4. Generics and 2.1 Knowledge of Java I/O 2.2 Abstract Java 2.2 Abstract Java
Collections Principles Fundamentals classes and classes and
•Use the diamond •Read and write data from subclasses are subclasses are
syntax to create a the console constructed in constructed in
collection and for type •Use streams to read and accordance with accordance with
write files Java framework Java framework
inference
2.2 Knowledge Java File 2.3 Static and 2.3 Static and
•Analyze the I/O (NIO.2)
interoperability of final keywords final keywords
•Use the Path class to are used in are used in
collections that use raw operate on file and
types and generic types accordance with accordance with
directory paths
•Use wrapper classes, •Use the Files class to Java framework Java framework
autoboxing and check, delete, copy, or 2.4 Top-level 2.4 Top-level
unboxing move a file or directory and nested and nested
•Read and change file and classes are classes are
•Create and use List,
directory attributes created in created in
Set, and Deque
•Recursively access a accordance with accordance with
implementations directory tree using the Java framework Java framework
•Create and use a Map DirectoryStream and 2.5 Enumerated 2.5 Enumerated
•Use FileVisitor interfaces types are used in types are used in
java.util.Comparator •Find a class using the accordance with accordance with
and PathMatcher class
•Watch a directory for Java framework Java framework
java.lang.Comparable
2.6 Write code 2.6 Write code
•Sort and search arrays changes by using that declares, that declares,
and lists WatcherService implements, implements,
1.Build Strings 2.3 Understand and/or extends and/or extends
fundamentals of Java interfaces interfaces
•Scanner
Virtual Machine
•StringTokenizer 2.1Object 2.1Object
•Performance Principles
• StringBuilder •Common Performance Oriented Design Oriented Design
• String Problems Principles are Principles are
•Performance applied in applied in
• Formatter
Methodology accordance with accordance with
6. Java Virtual
•Development and Java framework Java framework
Machine
Performance 2.8 Generics and 2.8 Generics and
•HotSpot Generational 2.4 Apply basic Collections Collections
Garbage Collector performance tuning Principles are Principles are
•Monitor the Garbage principles to a Java used in used in
Collector with application accordance with accordance with
Command Line Tools 2.5 Profile the
Java framework Java framework
•Monitor the Garbage performance of a Java
Application and tune the 3.1 Search, 3.1 Search,
Collector with parse, and build parse, and build
VisualVM performance of a Java
application at the language strings are used strings are used
•Monitor the JIT level in accordance in accordance
Compiler 3.1. Basic computer with Java with Java
•Throughput and operation skills framework framework
Responsiveness 3.2. Logic analysis 3.2 String 3.2 String
7. Garbage Collection 3.3. Communication skills formatting is formatting is
Tuning 3.4. Code writing and used in used in
•Find Memory Leaks debugging skills accordance with accordance with
•Identify Lock Java framework Java framework
Contention 3.3 Throw and 3.3 Throw and
•Heap Profiling Anti- throws throws
patterns statements are statements are
•Method Profiling used in used in
Anti-patterns accordance with accordance with
•Garbage Collection Java framework Java framework
•Generational Garbage 3.4 Try 3.4 Try
Collection statement with statement with
•GC Performance multi-catch is multi-catch is
Metrics used in used in
accordance with accordance with
Java framework Java framework
3.5 Autoclose 3.5 Autoclose
features with a features with a
try-with- try-with-
resources resources
statement are statement are
used in used in
accordance with accordance with
Java framework Java framework
3.6 Custom 3.6 Custom
exceptions are exceptions are
created in created in
accordance with accordance with
Java framework Java framework
3.7 Invariants by 3.7 Invariants by
using assertions using assertions
are tested in are tested in
accordance with accordance with
Java framework Java framework
4.1 Layout of the 4.1 Layout of the
JDBC API is JDBC API is
defined in defined in
accordance with accordance with
Java framework Java framework
4.2 JDBC driver 4.2 JDBC driver
is used to is used to
connect to connect to
database in database in
accordance with accordance with
Java framework Java framework
4.3 JDBC 4.3 JDBC
RowSetProvider, RowSetProvider,
RowSetFactory, RowSetFactory,
and RowSet and RowSet
interfaces are interfaces are
used in used in
accordance with accordance with
Java framework Java framework
4.4 4.4
PreparedStateme PreparedStateme
nt and nt and
CallableStateme CallableStateme
nt objects are nt objects are
created and used created and used
5.1 Monitoring 5.1 Monitoring
CPU Usage is CPU Usage is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.2 Monitoring 5.2 Monitoring
Network I/O is Network I/O is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.3 Monitoring 5.3 Monitoring
Disk I/O is Disk I/O is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.4 Monitoring 5.4 Monitoring
Virtual Memory Virtual Memory
Usage is Usage is
Demonstrated in Demonstrated in
accordance with accordance with
Java framework Java framework
5.5 Monitoring 5.5 Monitoring
Java Virtual Java Virtual
Machine is Machine is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
5.6 Garbage 5.6 Garbage
Collection Collection
Tuning is Tuning is
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
6.1 Garbage 6.1 Garbage
Collection Collection
Algorithms are Algorithms are
created in created in
accordance with accordance with
Java framework Java framework
6.2 Types of 6.2 Types of
Garbage Garbage
Collectors are Collectors are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
6.3 JVM 6.3 JVM
Ergonomics are Ergonomics are
demonstrated in demonstrated in
accordance with accordance with
Java framework Java framework
6.4 Garbage 6.4 Garbage
Collection is Collection is
tuned in tuned in
accordance with accordance with
Java framework Java framework
6.5 Correct 6.5 Correct
Garbage Garbage
Collector is Collector is
selected in selected in
accordance with accordance with
Java framework Java framework
6.6 Garbage 6.6 Garbage
Collection Collection
Output is Output is
interpreted in interpreted in
accordance with accordance with
Java framework Java framework
7.1 Reference 7.1 Reference
Types in Java Types in Java are
are demonstrated demonstrated in
in accordance accordance with
with Java Java framework
framework 7.2 The use of
7.2 The use of Finalizers is
Finalizers is demonstrated in
demonstrated in accordance with
accordance with Java framework
Java framework 7.3 String-
7.3 String- efficient Java
efficient Java Applications are
Applications are demonstrated in
demonstrated in accordance with
accordance with Java framework
Java framework 7.4 Collection
7.4 Collection Classes are
Classes are demonstrated in
demonstrated in accordance with
accordance with Java framework
Java framework 7.5 Threads are
7.5 Threads are used in
used in accordance with
accordance with Java framework
Java framework 7.6 I/O is
7.6 I/O is efficiently used
efficiently used in accordance
in accordance with Java
with Java framework
framework

Performance Task – Software Development

Transfer Goal: The students will learn to develop a software that adheres with the best practice, this will also enable them to think critically and assess the role of software in solving real world problem.

The Dominican College of Tarlac is aiming to launch a software that will be beneficial not only for students and teacher but for society in general. Your subject teacher encourages all of you to develop
and present a software that could help the society with the current problems it is facing. Your work will be presented to the teachers, students and principal in the annual school colloquium. It will be
evaluated according to; Content, Research, Technicality, Creativity, Code Readability and Functions.

Goal: To develop a software that will be beneficial for the society

Role: Software Developer/Designer

Audience: Students, Teachers and the Principal


Situation: The Dominican College of Tarlac is aiming to launch a Software that will be beneficial not only for students and teacher but for society in general.

Product: Computer Software/Application

Standards: Content, Research, Technicality, Creativity, Code Readability and Functions

You might also like