Professional Documents
Culture Documents
1_v1
Details of Assessment
Term and Year Time allowed
Assessment No 2 of 2 Assessment Weighting 50%
Assessment Type Knowledge Questions and Case Study
Due Date Room
Details of Subject
Qualification ICT40120 Certificate IV in Information Technology
Subject Name Desktop Management
Details of Unit(s) of competency
Unit Code (s) and
ICTNWK428 Create scripts for networking
Names
Details of Student
Student Name
College Student ID
Details of Assessor
Assessor’s Name
Assessment Outcome
Assessment
Competent Not Yet Competent Marks /100
Result
Feedback to Student
Progressive feedback to students, identifying gaps in competency and comments on positive improvements:
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
______________________________________________________________________________________
The purpose of this assessment is to assess the student Competent (C) Not Yet Competent
in the following learning outcomes:
(NYC)
Each assessment component is recorded as either Competent (C) or Not Yet Competent (NYC). A student
can only achieve competence when all assessment components listed under “Purpose of the assessment”
section are recorded as competent. Your trainer will give you feedback after the completion of each
assessment. A student who is assessed as NYC (Not Yet Competent) is eligible for re-assessment.
Resources required for this Assessment
Marking Scale
1 Knowledge Question 1 /1
2 Knowledge Question 2 /1
3 Knowledge Question 3 /1
4 Knowledge Question 4 /1
5 Knowledge Question 5 /1
6 Knowledge Question 6 /1
7 Knowledge Question 7 /1
8 Knowledge Question 8 /1
9 Knowledge Question 9 /1
10 Knowledge Question 10 /1
11 Knowledge Question 11 /1
12 Activity 1 /4
13 Activity 2 /8
14 Activity 3 /9
15 Activity 4 /9
16 Activity 5 /9
TOTAL /50
Skills to document, engineer and conduct the simple tests for the confirmation of the
codes is according to the design specification.
Skills to identify the areas that have not been covered properly by the script.
Skills to take appropriate action for the compliance of the code according to the
security policy.
Skills to take appropriate action for the operation of the code according to the proper
permissions.
Skills to use the scripting debugging techniques that are suitable for the scripting
language for the detection and resolution of the syntactical, logical and design origin
errors.
Assessment type:
Written Questions
Applicable conditions:
This knowledge test is untimed and are conducted as open book tests (this means
you are able to refer to your textbook during the test).
You must read and respond to all questions.
You may handwrite/use computers to answer the questions.
You must complete the task independently.
As you complete this assessment task you are predominately demonstrating your
written skills and knowledge to your trainer/assessor.
Question 1
Answer the following questions:
Briefly explain four (4) principles of algorithm design? Answer in 150-250 words.
1. Responsibility
Any algorithmic system needs an effective leader who has the power to take quick action in the
event of any unfavorable individual or societal impacts. This is not an assertion of legal liability;
rather, it focuses on the ability for internal reform, avenues for complaint, and open
communication.
2. Explainability
The people who will be impacted by any judgments made by an algorithmic system should be able
to understand them. The target audience must be able to access and comprehend these
explanations; only highly technical information should not be provided to the general public.
3. Accuracy
Whether due to data problems in their inputs (garbage in, garbage out) or statistical uncertainty in
their outputs, algorithms produce errors.
4. Auditability
According to the auditability principle, algorithms should be created in a way that makes it
possible for outside parties to examine and evaluate their performance.
Question 2
Answer the following questions:
A) What do you understand by the Command line interface? Write your answer in 50-100
words.
B) What are the features of a command-line interface? List five (5).
A command-line interface (CLI), a text-based user interface, is used by users to interact
with computers and start programs (UI). Character user interfaces, console user
interfaces, and command-line user interfaces are further names for command-line
interfaces. It is based interface that allows users to interact with software and operating
systems by typing simple commands into the interface and then receiving a comparable
response in response to visual signals.
B) A command-line interface's characteristics:
Asset Identification
2. Management \s3. Grouping
4. Provisioning of the Operating System
5. Patching
Question 3
Answer the following questions:
A) What do you mean by Log files? Write your answer in 50-100 words.
B) What are the three (3) steps involved for creating a Log file using Notepad? Write your
answer in 50-100 words.
A) The main source of data for network observability is a log file, which is a computer-
generated data file containing details about usage patterns, activities, and processes
within an operating system, application, server, or other device.
B) Select Start, enter "Notepad," and then select the program from the list of results.
• To move to the next line, put LOG on the first line and press ENTER.
• Choose OK after clicking Save As from the File menu, giving your file a descriptive name
in the File name field.
Question 4
Answer the following questions:
What is the purpose of the program scheduling utility in Windows operating system? Write
your answer in 100-150 words.
You can program the MDP activities to run automatically depending on the start date, time, and
frequency that you choose using the Microsoft Scheduled Tasks software. It can be set to run
every day, every week, or every month. You can configure this program to launch as soon as you
log into Windows. Database administrators and application developers can regulate where and
when different actions are performed in the database environment by using the Scheduler. The
Scheduler could be useful given how time-consuming and challenging managing and organizing
these chores may be.
Question 5
Answer the following questions:
List and explain three (3) development methodologies. Answer in 200-300 words.
1. Agile
Teams build new features using the agile development technique to reduce risk (such as errors,
budget overruns, and changing needs). Teams must create software in manageable iterations,
which are discrete units of new functionality, according to all agile development methodologies.
The agile development methodology comes in numerous forms, such as scrum, crystal, extreme
programming (XP), and feature-driven development (FDD).
2. Waterfall
Most people consider the waterfall process to be the most conventional way to design software.
The objectives, design, execution, verification, and maintenance phases of the waterfall technique
all center on different aims. Before moving on to the following step, each operation must be
finished in its entirety. Usually, there isn't a procedure for going back and changing the
assignment or course.
3. DevOps
DevOps is a development method as well as a collection of procedures that help maintain an
organizational culture. The main focus of DevOps adoption is organizational change, which
improves communication between the divisions in charge of various stages of the development
life cycle, including development, quality assurance, and operations.
Question 6
Answer the following questions:
A) List and explain any three (3) Windows operating system tools. Write 50-100 words for
each tool.
B) List and explain any three (3) Windows operating system utilities. Write your answer in
100-150 words.
The only text editing capabilities available in Notepad are locating and altering text. There
were almost no keyboard shortcuts and no line-counting capability in Windows ME.
• OSK: Microsoft Windows has a function known as OSK that enables people with
restricted mobility to select keys on a keyboard using their mouse. It can be used to type
in practically any software program in place of a mechanical keyboard. All letters,
numbers, characters, and system keys—including Home, End, Insert, Page Up, Page Down,
Ctrl, Alt, Caps, and Shift—are available on the on-screen keyboard.
• Performance: The system monitoring tool Performance Monitor, also known as System
Monitor in Windows 9x, Windows 2000, and Windows XP, was initially introduced in
Windows NT 3.1. It keeps track of many computer activities, such as CPU and memory
consumption. By tracking the operation of the hardware, commercial software, and
applications on a local or remote system, this kind of tool can be used to identify the root
cause of issues.
B)
1. Initial Window Diagnostics
You can learn more about the settings of your operating system by using the Windows
Diagnostics app. Under Settings, Control Panel, Administrative Tools, and Computer
Management, you can find this tool.
2. Event Viewer for Windows
The Event Viewer can be used to keep track of system occurrences. System, security, and
application event logs can all be viewed and managed using Event Viewer. Right-click the
My Computer icon and choose Manage to start the Event Viewer.
3. Microsoft Windows Registry Editor
You may see the settings and environment of the machine using this software. Consult the
online help for a description of the information's display and the utility's features.
Question 7
Answer the following questions:
List and explain the three (3) testing methods that applied to an operating system. Write your
answer in 100-150 words.
1. Unit testing: The first level of testing is known as unit testing, and it is often carried out by
the developers themselves. It is the process of making sure that each and every software
component is functional and works as intended, right down to the code level. When
working in a test-driven environment, developers usually build and run the tests
themselves before handing the program or feature over to the testing team. Unit testing
will also make debugging simpler because it will be quicker to fix problems if they are
found sooner rather than later in the testing process.
2. System testing: A "black box" testing technique, system testing examines the integrated,
finished system as a whole to see whether it satisfies the original set of requirements.
Before going into production, the software must undergo extensive testing of its
functionality, which is typically carried out by a testing team independent of the team that
created the program.
3. Performance testing
Performance testing, often known as non-functional testing, is a method for figuring out
how an application will act under certain circumstances. We'll put it to the test in real-
world user scenarios to gauge its responsiveness and stability. The primary objective of
performance testing is to identify and address any potential performance bottlenecks in
the software under evaluation.
Question 8
Answer the following questions:
What are the five (5) tasks of debugging for a range of scripting scenarios? Answer in 100-
200 words.
The five debugging tasks for a variety of scripting contexts are as follows:
1. Understand Your Error Codes: By understanding what an HTTP error code implies, finding and
fixing software flaws may be made much simpler. A 404 error code denotes a potential issue in
the application's URL, whereas a 401 error code indicates that the login credentials you supplied
are possibly invalid.
2. Consistently make an effort to duplicate the error before making any code changes. Too
frequently, developers have read the problem description, made a few educated guesses, made
the necessary changes, checked the code in, and then proudly closed the ticket, only to discover
the next day when someone reopened the ticket that the problem hadn't been resolved.
3. Recognize Stack Traces: While not all issues will have one, the bulk of them do. To read and
comprehend everything in a short amount of time requires a certain aptitude. The most important
thing to remember is that sometimes the problem's source—the slimy offender who ruined your
picture-perfect day—is hidden several layers beneath the surface. You can find the issue's origin
by starting at the bottom of the intimidatingly lengthy stack trace and working your way up.
4. Google! Duck, Duck, Duck! Go: It makes no difference which search engine the user selects.
They can look online for a resolution to your problem. Before pressing the "search" button on the
5. The Brute Force Method is the most meticulous debugging technique, but it also requires the
most time and resources. In this approach, the program is loaded with print statements to print
the intermediate values in the hopes that one or more of the displayed values will aid in
identifying the statement that contains the problem. When a symbolic program, often known as a
source code debugger, is employed, this strategy is considerably more methodical. This is due to
how easy it is to inspect the values of numerous variables and how easy it is to create breakpoints
and watchpoints so that the values of variables can be quickly and easily verified.
Question 9
Answer the following questions:
What do you understand from Sequence, Selection and Iteration in terms of programming
structured control constructs? Write 50-100 words for each.
Question 10
Answer the following questions:
A) What are the five (5) scripting techniques that you will use to test automation? Write 30-
70 words for each technique.
A)
• Linear Scripting Technique
The simplest form of scripting is linear scripting, which manually records each test case's
performance step-by-step using the straightforward "Record n Playback" method. As a result, the
first round of testing is recorded by the QA team, and the second round entails playing back the
recorded scripts.
Structured Scripting Technique
Structured scripting techniques leverage control structures in the scripts like "if-else," "switch,"
"for," and "while" conditions to give QA teams control over the flow of the test scripts. Thus, the
structured scripting technique effectively gives testers the authority to include decision-making in
the script.
• Data-Driven Scripting Technique
The main goal of the data-driven scripting technique is to separate the data from the scripts and
save it as files in an external source. Consequently, the script just contains the computer code.
This method is recommended for testing with different data sets because it does not call for
adjustment even if the data is changed.
• Shared Scripting Technique
The difference between this scripting technique and others is that it asks for exchanging scripts
that simulate application activity. Due to their shared function with other scripts, the
aforementioned scripts are modular. Other software systems might also use these programs.
• Keyword Driven Scripting Technique
A development of data-driven scripting, keyword-driven scripting maintains control to do checks
and perform actions utilizing external data files. The test data and test sequence are kept on an
external data file using this technique.
B)
The set of guidelines that define how a language is structured is known as syntax. In computer
programming, the term syntax refers to the rules that specify where commas, characters, and
numbers should be placed in a programming language. Without syntax, it is exceedingly difficult
to comprehend the semantics or core of a language. Compilers and interpreters are unable to
comprehend code that does not adhere to a language's grammar.
Question 11
Answer the following questions:
a) What are the ten (10) factors to consider while creating technical documentation?
b) What is the importance of the user-level documentation? Write your answer in 50-100
words.
a)
a) Documentation plan
b) Design Structure
c) Illustrations and graphics
d) Clear writing
e) Installation steps
f) Troubleshooting
g) Testing
h) Review process
i) Functionality
j) Organized
b)
It is possible to ensure that users or consumers truly understand how to get the most of your
product by providing user documentation. Your end-user documentation is an integral aspect of
your interaction with your customers, whether it contains instructions on how to save a file, start
a motor, utilize a certain product, or even crucial safety information.
Beside the Head office in the city, the company has a remote office in the regional area. A
network of six desktops along with network printer and scanner is operational at the regional
office. Mark-the Systems Administrator Manages the IT setup of both the offices. He
manages the regional office from the Head office by connecting through Remote Access.
Due to non-availability of the IT resource at the regional office, Mark has decided to
implement some scripting codes for the better controlling and monitoring of the networked
environment at the regional office. Mark wants to implement the scripting process over the
network as due to the following benefits of the scripting languages:
Easy to use
Minimum programming knowledge or experience required for the execution of the
task
Allow complex tasks to be performed in relatively few steps
Allow simple creation and editing in a variety of text editors
Allow the addition of dynamic and interactive activities
Editing and running code is fast
Mark-the System Administrator needs to write and implement scripts for the auto shutdown
the desktop systems at the regional office. The scripting will enable the auto shutdown of the
systems at a particular time after office shutdown. This will help the optimal performance of
the network and desktops of the regional office along with the security protection of the
malwares.
The management of the IP addresses will also be done by writing scripted codes and by
implementing them for execution. Mark also requires the testing of the scripting codes by
implementing a batch file to verify the execution of the scripting code. Adam the IT Manager
is in charge at Sovereign Air will finalise all the executions using the scripting codes. Also,
the Admin Manager of the regional office will show his concern for remote access and
performance of the company’s Information System application.
In this activity, you need to arrange a meeting with IT manager (Adam) and regional admin
manager.
In the meeting, you need to discuss regional office problems related ICT network and identify
the network scripting requirements.
You (student) will act as Mark and discuss the problems and identify the scripting
requirements to resolve the problems. You also need to discuss various scripting options to
meet stakeholders needs.
Your trainer will act as an IT manager. He will input related to scripting options.
One of your classmates will act as a regional admin manager and discuss the ICT related
issues.
You also need to complete the following meeting minutes template and submit to your
trainer/assessor.
Attendees:
Venue:
Date:
Actions
No. Points Discussed Target Date
Suggested
a lost or sluggish internet connection
You need to write a script for the network that will take IP address automatic, and you may
choose to add static IP address as well.
Performance checklist
In this activity, you need to create a code based on the created algorithm.
Your trainer will provide you following resources to complete the activity:
Computer
Internet
Scripting language software
Your trainer will observe you during the activity and complete the following performance
checklist.
Performance checklist
Activity 4: Use Operating system tools to store, run, test and debug the script
Your trainer will provide you following resources to complete the activity:
Computers
Internet
Scripting language software
Network server
Scripting testing environment
In this activity, you need to store and run the application on server and complete the
following tasks:
Your trainer will observe you during the activity and complete the following performance
checklist.
System: Date:
Repair
Item # Task Discussion
N/A
OK
Script software
Server software
Test result
Errors on scripts
Performance checklist
Test the script to confirm the code meet the user requirements
security requirements
In this activity, you need to create a report that will include the information related to user-
level and technical level.
1. User-level documentation
a. Overview of the code
b. What problem code is solving
c. What are the benefits of the code
2. Technical-level documentation
a. Copy of the code
b. Test result
c. Software used
d. Maintenance requirements (If any)
You need to complete the following template and submit to your trainer/assessor.
Performance checklist
User-level documentation
Technical-level documentation