You are on page 1of 25

T-1.8.

1_v1

Details of Assessment
Term and Year Time allowed
Assessment No 2 of 2 Assessment Weighting 50%
Assessment Type Knowledge Questions and Case Study
Due Date Room
Details of Subject
Qualification ICT40120 Certificate IV in Information Technology 
Subject Name Desktop Management
Details of Unit(s) of competency
Unit Code (s) and
ICTNWK428 Create scripts for networking
Names
Details of Student
Student Name
College Student ID

Student Declaration: I declare that the work submitted is my


own and has not been copied or plagiarised from any person Student’s
or source. I acknowledge that I understand the requirements Signature: ____________________
to complete the assessment tasks. I am also aware of my
right to appeal. The feedback session schedule and Date: _____/_____/_________
reassessment procedure were explained to me.

Details of Assessor
Assessor’s Name

Assessment Outcome
Assessment
Competent Not Yet Competent Marks /100
Result
Feedback to Student
Progressive feedback to students, identifying gaps in competency and comments on positive improvements:
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________

Assessor Declaration: I declare that I have conducted


a fair, valid, reliable and flexible assessment with this
student. Assessor’s
Signature: ___________________
Student attended the feedback session.
Student did not attend the feedback session. Date: _____/_____/________

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 1


T-1.8.1_v1

Purpose of the Assessment

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 2


T-1.8.1_v1

The purpose of this assessment is to assess the student Competent (C) Not Yet Competent
in the following learning outcomes:
(NYC)

Knowledge Evidence: ICTNWK428 Create scripts for networking

Knowledge of principles of algorithm design

Knowledge of operating system components and processes,


including:

 command line interface


 log files
 program scheduling utilities
 data types
 operations and expressions
 development methodologies

Knowledge of tools, utilities and testing methods that may be


used to create scripts for networking

Knowledge of debugging for a variety of scripting scenarios

Knowledge of programming structured control constructs:


sequence, selection and iteration

Knowledge of scripting techniques and language syntax that


may be used to create scripts for networking.

Performance Criteria: ICTNWK428 Create scripts for networking

1. Prepare to write networking scripts

1.1 Determine and document problem and script solution


requirements according to organisational requirements

1.2 Employ abbreviated software development cycle to script


creation according to task requirements

1.3 Develop pre-emptive downtime solution algorithm


according to task requirements

1.4 Develop a guaranteed to end algorithm according to task


requirements

2. Create and implement code

2.1 Select and create clear and concise code according to


task requirements

2.2 Implement selection, iteration and sequence to control


script execution flow according to task requirements

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 3


T-1.8.1_v1

2.3 Implement sequential file input and output and retrieve


and store information

2.4 Seek and respond to script operation from user input


according to task requirements

3. Implement operating system tools

3.1 Use searching and sorting tools to select information


from logging output of operating system (OS)

3.2 Implement controls and demonstrate capability of script


to maintain a log of operations

3.3 Register and run scripts with OS scheduling facility

4. Test and finalise script activities

4.1 Test script against design specification and task


requirements

4.2 Identify and resolve scripting language bugs, syntactical,


logical and design errors

4.3 Store unused materials and ICT equipment according to


manufacturing specifications and organisational procedures

4.4 File documentation in required location according to


organisational procedures

Assessment/evidence gathering conditions

Each assessment component is recorded as either Competent (C) or Not Yet Competent (NYC). A student
can only achieve competence when all assessment components listed under “Purpose of the assessment”
section are recorded as competent. Your trainer will give you feedback after the completion of each
assessment. A student who is assessed as NYC (Not Yet Competent) is eligible for re-assessment.
Resources required for this Assessment

 Computer with relevant software applications and access to internet


 Weekly eLearning notes relevant to the tasks/questions
Instructions for Students
Please read the following instructions carefully
 This assessment must be completed In class At home
 The assessment is to be completed according to the instructions given by your assessor.
 Feedback on each task will be provided to enable you to determine how your work could be improved.
You will be provided with feedback on your work within two weeks of the assessment due date. All other
feedback will be provided by the end of the term.
 Should you not answer the questions correctly, you will be given feedback on the results and your gaps
in knowledge. You will be given another opportunity to demonstrate your knowledge and skills to be
deemed competent for this unit of competency.
 If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
 Please refer to the College re-assessment for more information (Student handbook).

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 4


T-1.8.1_v1

Marking Scale

Topics Marks allocated

1 Knowledge Question 1 /1

2 Knowledge Question 2 /1

3 Knowledge Question 3 /1

4 Knowledge Question 4 /1

5 Knowledge Question 5 /1

6 Knowledge Question 6 /1

7 Knowledge Question 7 /1

8 Knowledge Question 8 /1

9 Knowledge Question 9 /1

10 Knowledge Question 10 /1

11 Knowledge Question 11 /1

12 Activity 1 /4

13 Activity 2 /8

14 Activity 3 /9

15 Activity 4 /9

16 Activity 5 /9

TOTAL /50

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 5


T-1.8.1_v1

Purpose of the assessment

This assessment task is designed to evaluate student’s knowledge essential to undertake


scripted programming tasks for networking related activities & Knowledge regarding to the
following:

 Knowledge of principles of algorithm design


 Knowledge of operating system components and processes, including:
o command line interface
o log files
o program scheduling utilities
o data types
o operations and expressions
o development methodologies
 Knowledge of tools, utilities and testing methods that may be used to create scripts
for networking
 Knowledge of debugging for a variety of scripting scenarios
 Knowledge of programming structured control constructs: sequence, selection and
iteration
 Knowledge of scripting techniques and language syntax that may be used to create
scripts for networking.
 Skills to deploy abbreviated software development cycle for the creation of the script.
 Skills to develop the algorithm to solve the problem and to take account of expected
possible solutions.
 Skills to develop the algorithm which is supposed to finish and compile.
 Skills to use the structure, sequence, selection and iteration.
 Selection of the relevant scripting language as well as the understanding of the
application of the basic language syntax rules.
 Skills to identify and select data types, operators and expressions for the creation of
the accurate code.
 Skills to use techniques to use selection, iteration and sequence to control the
execution of the script flow.
 Skills to use techniques for sequential files and storage and retrieving the
information.
 Skills to document internal principles for creating code.
 Skills to work according to the organisational policies and procedures while
developing maintainable code for creating scripts.
 Skills to comply with coding standards while creating scripts.
 Skills to use different tools for searching and selection of information from the logging
output of operating system.
 Skills to control implementation to ensure that the events occur, creation of the script
and maintaining a log of operations using logging mechanism of the operating
system.
 Skills to managing while running and registering the scripts using the OS scheduling
facility.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 6


T-1.8.1_v1

 Skills to document, engineer and conduct the simple tests for the confirmation of the
codes is according to the design specification.
 Skills to identify the areas that have not been covered properly by the script.
 Skills to take appropriate action for the compliance of the code according to the
security policy.
 Skills to take appropriate action for the operation of the code according to the proper
permissions.
 Skills to use the scripting debugging techniques that are suitable for the scripting
language for the detection and resolution of the syntactical, logical and design origin
errors.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 7


T-1.8.1_v1

Part A – Writing Questions

Assessment type:
 Written Questions

Assessment task description:


 The Knowledge Test is comprised of 11 written questions.
 You must respond to all questions and submit them to your Trainer/Assessor.

Applicable conditions:
 This knowledge test is untimed and are conducted as open book tests (this means
you are able to refer to your textbook during the test).
 You must read and respond to all questions.
 You may handwrite/use computers to answer the questions.
 You must complete the task independently.
 As you complete this assessment task you are predominately demonstrating your
written skills and knowledge to your trainer/assessor.

Instructions for answering written questions:


 Complete a written assessment consisting of a series of questions.
 You will be required to correctly answer all the questions.
 Do not start answering questions without understanding what is required from you.
Read the questions carefully and critically analyse them for a few seconds, this will
help you to identify what is really needed.
 Your answers must demonstrate an understanding and application of relevant
concepts, critical thinking, and good writing skills.
 Be concise to the point and write answers according to the given word-limit to each
question and do not provide irrelevant information. Be careful, quantity is not quality.
 When you quote, paraphrase, summaries or copy information from the sources you
are using to write your answers/research your work, you must always acknowledge
the source.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 8


T-1.8.1_v1

Question 1
Answer the following questions:

Briefly explain four (4) principles of algorithm design? Answer in 150-250 words.

1. Responsibility
Any algorithmic system needs an effective leader who has the power to take quick action in the
event of any unfavorable individual or societal impacts. This is not an assertion of legal liability;
rather, it focuses on the ability for internal reform, avenues for complaint, and open
communication.
2. Explainability
The people who will be impacted by any judgments made by an algorithmic system should be able
to understand them. The target audience must be able to access and comprehend these
explanations; only highly technical information should not be provided to the general public.
3. Accuracy
Whether due to data problems in their inputs (garbage in, garbage out) or statistical uncertainty in
their outputs, algorithms produce errors.
4. Auditability
According to the auditability principle, algorithms should be created in a way that makes it
possible for outside parties to examine and evaluate their performance.

Question 2
Answer the following questions:

A) What do you understand by the Command line interface? Write your answer in 50-100
words.
B) What are the features of a command-line interface? List five (5).
A command-line interface (CLI), a text-based user interface, is used by users to interact
with computers and start programs (UI). Character user interfaces, console user
interfaces, and command-line user interfaces are further names for command-line
interfaces. It is based interface that allows users to interact with software and operating
systems by typing simple commands into the interface and then receiving a comparable
response in response to visual signals.
B) A command-line interface's characteristics:
Asset Identification
2. Management \s3. Grouping
4. Provisioning of the Operating System
5. Patching

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 9


T-1.8.1_v1

Question 3
Answer the following questions:

A) What do you mean by Log files? Write your answer in 50-100 words.

B) What are the three (3) steps involved for creating a Log file using Notepad? Write your
answer in 50-100 words.

A) The main source of data for network observability is a log file, which is a computer-
generated data file containing details about usage patterns, activities, and processes
within an operating system, application, server, or other device.
B) Select Start, enter "Notepad," and then select the program from the list of results.
• To move to the next line, put LOG on the first line and press ENTER.
• Choose OK after clicking Save As from the File menu, giving your file a descriptive name
in the File name field.

Question 4
Answer the following questions:

What is the purpose of the program scheduling utility in Windows operating system? Write
your answer in 100-150 words.

You can program the MDP activities to run automatically depending on the start date, time, and
frequency that you choose using the Microsoft Scheduled Tasks software. It can be set to run
every day, every week, or every month. You can configure this program to launch as soon as you
log into Windows. Database administrators and application developers can regulate where and
when different actions are performed in the database environment by using the Scheduler. The
Scheduler could be useful given how time-consuming and challenging managing and organizing
these chores may be.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 10


T-1.8.1_v1

Question 5
Answer the following questions:

List and explain three (3) development methodologies. Answer in 200-300 words.

1. Agile
Teams build new features using the agile development technique to reduce risk (such as errors,
budget overruns, and changing needs). Teams must create software in manageable iterations,
which are discrete units of new functionality, according to all agile development methodologies.
The agile development methodology comes in numerous forms, such as scrum, crystal, extreme
programming (XP), and feature-driven development (FDD).
2. Waterfall
Most people consider the waterfall process to be the most conventional way to design software.
The objectives, design, execution, verification, and maintenance phases of the waterfall technique
all center on different aims. Before moving on to the following step, each operation must be
finished in its entirety. Usually, there isn't a procedure for going back and changing the
assignment or course.
3. DevOps
DevOps is a development method as well as a collection of procedures that help maintain an
organizational culture. The main focus of DevOps adoption is organizational change, which
improves communication between the divisions in charge of various stages of the development
life cycle, including development, quality assurance, and operations.

Question 6
Answer the following questions:

A) List and explain any three (3) Windows operating system tools. Write 50-100 words for
each tool.

B) List and explain any three (3) Windows operating system utilities. Write your answer in
100-150 words.

A) The tools included with the operating system are as follows:


• Notepad, a straightforward text editor for Windows that enables the creation and
editing of plain text files. Notepad has been a staple of every version of Windows ever
since it was first published in 1983 to help MS-DOS commercialize the computer mouse.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 11


T-1.8.1_v1

The only text editing capabilities available in Notepad are locating and altering text. There
were almost no keyboard shortcuts and no line-counting capability in Windows ME.
• OSK: Microsoft Windows has a function known as OSK that enables people with
restricted mobility to select keys on a keyboard using their mouse. It can be used to type
in practically any software program in place of a mechanical keyboard. All letters,
numbers, characters, and system keys—including Home, End, Insert, Page Up, Page Down,
Ctrl, Alt, Caps, and Shift—are available on the on-screen keyboard.
• Performance: The system monitoring tool Performance Monitor, also known as System
Monitor in Windows 9x, Windows 2000, and Windows XP, was initially introduced in
Windows NT 3.1. It keeps track of many computer activities, such as CPU and memory
consumption. By tracking the operation of the hardware, commercial software, and
applications on a local or remote system, this kind of tool can be used to identify the root
cause of issues.
B)
1. Initial Window Diagnostics
You can learn more about the settings of your operating system by using the Windows
Diagnostics app. Under Settings, Control Panel, Administrative Tools, and Computer
Management, you can find this tool.
2. Event Viewer for Windows
The Event Viewer can be used to keep track of system occurrences. System, security, and
application event logs can all be viewed and managed using Event Viewer. Right-click the
My Computer icon and choose Manage to start the Event Viewer.
3. Microsoft Windows Registry Editor
You may see the settings and environment of the machine using this software. Consult the
online help for a description of the information's display and the utility's features.

Question 7
Answer the following questions:

List and explain the three (3) testing methods that applied to an operating system. Write your
answer in 100-150 words.

The three operating system testing techniques are as follows:

1. Unit testing: The first level of testing is known as unit testing, and it is often carried out by
the developers themselves. It is the process of making sure that each and every software
component is functional and works as intended, right down to the code level. When
working in a test-driven environment, developers usually build and run the tests
themselves before handing the program or feature over to the testing team. Unit testing

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 12


T-1.8.1_v1

will also make debugging simpler because it will be quicker to fix problems if they are
found sooner rather than later in the testing process.
2. System testing: A "black box" testing technique, system testing examines the integrated,
finished system as a whole to see whether it satisfies the original set of requirements.
Before going into production, the software must undergo extensive testing of its
functionality, which is typically carried out by a testing team independent of the team that
created the program.
3. Performance testing
Performance testing, often known as non-functional testing, is a method for figuring out
how an application will act under certain circumstances. We'll put it to the test in real-
world user scenarios to gauge its responsiveness and stability. The primary objective of
performance testing is to identify and address any potential performance bottlenecks in
the software under evaluation.

Question 8
Answer the following questions:

What are the five (5) tasks of debugging for a range of scripting scenarios? Answer in 100-
200 words.

The five debugging tasks for a variety of scripting contexts are as follows:

1. Understand Your Error Codes: By understanding what an HTTP error code implies, finding and
fixing software flaws may be made much simpler. A 404 error code denotes a potential issue in
the application's URL, whereas a 401 error code indicates that the login credentials you supplied
are possibly invalid.

2. Consistently make an effort to duplicate the error before making any code changes. Too
frequently, developers have read the problem description, made a few educated guesses, made
the necessary changes, checked the code in, and then proudly closed the ticket, only to discover
the next day when someone reopened the ticket that the problem hadn't been resolved.

3. Recognize Stack Traces: While not all issues will have one, the bulk of them do. To read and
comprehend everything in a short amount of time requires a certain aptitude. The most important
thing to remember is that sometimes the problem's source—the slimy offender who ruined your
picture-perfect day—is hidden several layers beneath the surface. You can find the issue's origin
by starting at the bottom of the intimidatingly lengthy stack trace and working your way up.

4. Google! Duck, Duck, Duck! Go: It makes no difference which search engine the user selects.
They can look online for a resolution to your problem. Before pressing the "search" button on the

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 13


T-1.8.1_v1

search engine, gather as much relevant information as you can.

5. The Brute Force Method is the most meticulous debugging technique, but it also requires the
most time and resources. In this approach, the program is loaded with print statements to print
the intermediate values in the hopes that one or more of the displayed values will aid in
identifying the statement that contains the problem. When a symbolic program, often known as a
source code debugger, is employed, this strategy is considerably more methodical. This is due to
how easy it is to inspect the values of numerous variables and how easy it is to create breakpoints
and watchpoints so that the values of variables can be quickly and easily verified.

Question 9
Answer the following questions:

What do you understand from Sequence, Selection and Iteration in terms of programming
structured control constructs? Write 50-100 words for each.

• Sequencing: The first programming construct is a sequence. The sequential execution of


instructions is a key component of programming. The order in which the phrases are carried out is
known as the sequence. The order in which commands are performed is crucial since carrying out
the wrong order can cause a program to break.
• Selection: A part of code is only executed by programming construction if a prerequisite is
satisfied. There are times in programming when a choice must be made. The act of selecting is the
process. The decision's outcome affects the direction the program will go in moving forward.
• Iteration: In programming, specifically, iterative refers to the repetition of a set of instructions or
code to achieve a particular outcome. Circular or evolutionary development are other names for
iterative development.

Question 10
Answer the following questions:

A) What are the five (5) scripting techniques that you will use to test automation? Write 30-
70 words for each technique.

B) Explain in 50-100 words, what is meant by language syntax?

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 14


T-1.8.1_v1

A)
• Linear Scripting Technique
The simplest form of scripting is linear scripting, which manually records each test case's
performance step-by-step using the straightforward "Record n Playback" method. As a result, the
first round of testing is recorded by the QA team, and the second round entails playing back the
recorded scripts.
 Structured Scripting Technique
Structured scripting techniques leverage control structures in the scripts like "if-else," "switch,"
"for," and "while" conditions to give QA teams control over the flow of the test scripts. Thus, the
structured scripting technique effectively gives testers the authority to include decision-making in
the script.
• Data-Driven Scripting Technique
The main goal of the data-driven scripting technique is to separate the data from the scripts and
save it as files in an external source. Consequently, the script just contains the computer code.
This method is recommended for testing with different data sets because it does not call for
adjustment even if the data is changed.
• Shared Scripting Technique
The difference between this scripting technique and others is that it asks for exchanging scripts
that simulate application activity. Due to their shared function with other scripts, the
aforementioned scripts are modular. Other software systems might also use these programs.
• Keyword Driven Scripting Technique
A development of data-driven scripting, keyword-driven scripting maintains control to do checks
and perform actions utilizing external data files. The test data and test sequence are kept on an
external data file using this technique.
B)
The set of guidelines that define how a language is structured is known as syntax. In computer
programming, the term syntax refers to the rules that specify where commas, characters, and
numbers should be placed in a programming language. Without syntax, it is exceedingly difficult
to comprehend the semantics or core of a language. Compilers and interpreters are unable to
comprehend code that does not adhere to a language's grammar.

Question 11
Answer the following questions:

a) What are the ten (10) factors to consider while creating technical documentation?

b) What is the importance of the user-level documentation? Write your answer in 50-100
words.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 15


T-1.8.1_v1

a)
a) Documentation plan
b) Design Structure
c) Illustrations and graphics
d) Clear writing
e) Installation steps
f) Troubleshooting
g) Testing
h) Review process
i) Functionality
j) Organized

b)
It is possible to ensure that users or consumers truly understand how to get the most of your
product by providing user documentation. Your end-user documentation is an integral aspect of
your interaction with your customers, whether it contains instructions on how to save a file, start
a motor, utilize a certain product, or even crucial safety information.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 16


T-1.8.1_v1

Part B – Case Study Scenario


Sovereign air is a company that provides repairs and maintenance to commercial Air
conditioning, refrigeration and mechanical plant on professional basis. The company is
employing around 50 service staff and on-site personnel by offering clients personalized,
professional and responsive service and by developing short, medium and long-term
maintenance programs. Over the years the company has gained experience in nearly every
facet of the mechanical industry including plant for High rise buildings, industrial equipment
and commercial equipment in either air conditioning or refrigeration plant.

Beside the Head office in the city, the company has a remote office in the regional area. A
network of six desktops along with network printer and scanner is operational at the regional
office. Mark-the Systems Administrator Manages the IT setup of both the offices. He
manages the regional office from the Head office by connecting through Remote Access.

In the regional office has the following problems:

 No IT support personal available


 All the computer turns on 24 hours
 More power consumption
 Security issues
 IP address allocation issue

Due to non-availability of the IT resource at the regional office, Mark has decided to
implement some scripting codes for the better controlling and monitoring of the networked
environment at the regional office. Mark wants to implement the scripting process over the
network as due to the following benefits of the scripting languages:

 Easy to use
 Minimum programming knowledge or experience required for the execution of the
task
 Allow complex tasks to be performed in relatively few steps
 Allow simple creation and editing in a variety of text editors
 Allow the addition of dynamic and interactive activities
 Editing and running code is fast

Mark-the System Administrator needs to write and implement scripts for the auto shutdown
the desktop systems at the regional office. The scripting will enable the auto shutdown of the
systems at a particular time after office shutdown. This will help the optimal performance of
the network and desktops of the regional office along with the security protection of the
malwares.

The management of the IP addresses will also be done by writing scripted codes and by
implementing them for execution. Mark also requires the testing of the scripting codes by
implementing a batch file to verify the execution of the scripting code. Adam the IT Manager
is in charge at Sovereign Air will finalise all the executions using the scripting codes. Also,
the Admin Manager of the regional office will show his concern for remote access and
performance of the company’s Information System application.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 17


T-1.8.1_v1

Organisation guidelines to create code and coding standards:

 Write clean code


 You must evaluate problems with relevant stakeholders
 Prepare algorithm before preparing code
 Algorithm must end
 All the code must be approved by IT manager
 Code must be in a smaller size
 Inline comments explaining the functioning of the subroutine or key aspects of the
algorithm shall be frequently used.
 The name of the source file or script shall represent its function. All of the routines in
a file shall have a common purpose.
 Variable shall have mnemonic or meaningful names that convey to a casual
observer, the intent of its use. Variables shall be initialized prior to its first use.
 The proper use of spaces within a line of code can enhance readability. Good rules
of thumb are as follows:
o A keyword followed by a parenthesis should be separated by a space.
o A blank space should appear after each comma in an argument list.
o All binary operators except “.” should be separated from their operands by
spaces. Blank spaces should never separate unary operators such as unary
minus, increment (“++”), and decrement (“— “) from their operands.

Organisation security policy

 Do not install unlicensed software


 Do not install third-party software without valid digital signature
 Do not provide administrator access to other staff
 Data backup every three hours
 Do not allow any third party in a server room without permission
 Do virus scan every day
 Check system and network log every day
 Firewall must be enabling all the time
 Staff only access to relevant files, management access all the files except director
files and director can access all files and folders
 Create a strong password consists of at least six characters (and the more
characters, the stronger the password) that are a combination of letters, numbers
and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so
a strong password contains letters in both uppercase and lowercase.

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 18


T-1.8.1_v1

Activity 1: Meeting with stakeholders

You need to read and understand the given scenario.

In this activity, you need to arrange a meeting with IT manager (Adam) and regional admin
manager.

In the meeting, you need to discuss regional office problems related ICT network and identify
the network scripting requirements.

You (student) will act as Mark and discuss the problems and identify the scripting
requirements to resolve the problems. You also need to discuss various scripting options to
meet stakeholders needs.

Your trainer will act as an IT manager. He will input related to scripting options.

One of your classmates will act as a regional admin manager and discuss the ICT related
issues.

You also need to complete the following meeting minutes template and submit to your
trainer/assessor.

Meeting minutes template:


Minutes of Meeting
Meeting Objective:

Attendees:

Venue:

Date:

Actions
No. Points Discussed Target Date
Suggested
a lost or sluggish internet connection

Updates. Solve these


2022-08-20
problems
No printer is plugged in.

 Data and File Sharing:


 Performance:
Use these network
 Backup: 2022-08-21
scripting
 Security:

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 19


T-1.8.1_v1

Discussed different scripting options

Signature of attendee 1: Signature of attendee 2:

Signature of attendee 3: Signature of attendee 4:

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 20


T-1.8.1_v1

Activity 2: Develop an algorithm for the ICT problems

This activity is continuing from the previous activity.

You need to write a script for the network that will take IP address automatic, and you may
choose to add static IP address as well.

You need to complete the following task:

Develop algorithm for the given problems

 Use software development life cycle


 Algorithm should take account of all the possible situations
 Algorithm must end
 Use structure, sequence, selection and iteration while you are creating the algorithm

Your task must address the following performance checklist.

Performance checklist

To be assessed as satisfactory (S) in this assessment task the S N/S Trainer/Assessor to


student needs to demonstrate competency in the following critical complete (Comment)
aspects of evidence

Develop algorithm for the given problems

 Use software development life cycle


 Algorithm should take account of all the possible solutions
 Algorithm must end
 Use structure, sequence, selection and iteration while you
are creating the algorithm

Activity 3: Create scripting code

This activity is continuing from the previous activity.

In this activity, you need to create a code based on the created algorithm.

Your trainer will provide you following resources to complete the activity:

 Computer
 Internet
 Scripting language software

You need to complete the following activities:

 Select appropriate scripting language based on the algorithm


 Use data types, operators and expression
 Prepare two scripts

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 21


T-1.8.1_v1

o One should shut down the computer


o The other should record computer login and log out
 Code must follow the flow, iteration according to the algorithm
 Use sequential file input and output according to the algorithm
 Follow organisational guidelines and coding standards to create code

Your trainer will observe you during the activity and complete the following performance
checklist.

Performance checklist

To be assessed as satisfactory (S) in this assessment task the S N/S Trainer/Assessor to


student needs to demonstrate competency in the following critical complete (Comment)
aspects of evidence

Select appropriate scripting language based on the algorithm

Use data types, operators and expression

Prepare two scripts

 One should shut down the computer


 The other should record computer login and log out

Code must follow the flow, iteration according to the algorithm

Use sequential file input and output according to the algorithm

Follow organisational guidelines and coding standards to create


code

Activity 4: Use Operating system tools to store, run, test and debug the script

This activity is continuing from the previous activity.

Your trainer will provide you following resources to complete the activity:

 Computers
 Internet
 Scripting language software
 Network server
 Scripting testing environment

In this activity, you need to store and run the application on server and complete the
following tasks:

 Use searching and sorting tool on server


 Store the script at the proper location on server

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 22


T-1.8.1_v1

 Run the script with server scheduling facility


 Only server administrator is allowed to manage the code
 Test the script to confirm the code meet the user requirements
o Use different testing tools and techniques
o Use debugging tools to identify the error in the script
o Update the code to meet organisational guidelines and security requirements
o Complete the script testing template

Your trainer will observe you during the activity and complete the following performance
checklist.

Template for Script testing

Title: Script testing Frequency: Quarterly

System: Date:

Repair
Item # Task Discussion

N/A
OK
Script software

Server software

Test result

Errors on scripts

Performance checklist

To be assessed as satisfactory (S) in this assessment task the S N/S Trainer/Assessor to


student needs to demonstrate competency in the following critical complete (Comment)
aspects of evidence

Use searching and sorting tool on server

Store the script at the proper location on server

Run the script with server scheduling facility

Only server administrator is allowed to manage the code

Test the script to confirm the code meet the user requirements

 Complete the test template


 Use different testing tools and techniques
 Use debugging tools to identify the error in the script
 Update the code to meet organisational guidelines and

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 23


T-1.8.1_v1

security requirements

Activity 5: Document script

This activity is continuing from the previous activity.

In this activity, you need to create a report that will include the information related to user-
level and technical level.

Your report must include the following information:

1. User-level documentation
a. Overview of the code
b. What problem code is solving
c. What are the benefits of the code
2. Technical-level documentation
a. Copy of the code
b. Test result
c. Software used
d. Maintenance requirements (If any)

You need to complete the following template and submit to your trainer/assessor.

Report on network scripts

Overview of the code-

The code will shut down the computer

User-level What problem code is solving


documentation
The code is used to shut down through php script

What are the benefits of the code?

To shut down using just scripts

Copy of the code – <? php system('shutdown -s -t 45'); ?>

Test result – The computers turned off


Technical-level
documentation
Software used- PHP

Maintenance requirements (If any) –

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 24


T-1.8.1_v1

Performance checklist

To be assessed as satisfactory (S) in this assessment task the S N/S Trainer/Assessor to


student needs to demonstrate competency in the following critical complete (Comment)
aspects of evidence

User-level documentation

 Overview of the code


 What problem code is solving
 What are the benefits of the code

Technical-level documentation

 Copy of the code


 Test result
 Software used
 Maintenance requirements (If any)

Desktop Management - Assessment II v.1, Last updated on 23/07/2021 Page 25

You might also like