Download Systems Software

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
The Further Education and Training Awards Council
(FETAC) was set up as a statutory body on 11 June 2001
by the Minister for Education and Science.
Under the Qualifications (Education & Training) Act, 1999,
FETAC now has responsibility for making awards
previously made by NCVA.
Module Descriptor
Systems Software
Level 6 C30255
www.fetac.ie
1
Module Title
Systems Software
2
Module Code
C30255
3
Level
6
4
Credit Value
1 credit
5
Purpose
This module is a statement of the standards to be achieved to
gain a FETAC credit in Systems Software at Level 6. It is
designed to provide a solid foundation for the student in the
fundamentals of distributed computing systems.
6
Preferred
Entry Level
7
8
Special
Requirements
An appropriate award at Level 5 Certificate in or equivalent
qualifications and/or relevant life and work experiences.
This should be delivered together with modules in Client/Server
Networking and Network Theory
General Aims
Learners who successfully complete this module will:
8.1
Recognise that systems software complements a diversity of
hardware platforms
8.2
Recognise that systems software presents the user with a
uniform computing environment
8.3
Install, configure and optimise a variety of computer operating
systems, e.g., Windows XP, Linux, MacOS …
8.4
Install, configure and optimise a variety of computer peripherals
for operation between two or more disparate operating systems
8.5
Use appropriate procedures to manage a variety of major
operating system subsystems, e.g, virtual memory, file systems,
networking …
8.6
Identify the names, locations and purposes of major operating
system files and folders, e.g. config.sys, autoexec.bat, winnt,
ntdetect.com, ntoskrnl.exe, XF86Config, /bin, /etc, smbclient …
9
10
8.7
Identify and use major operating system utilities and tools, e.g.
msconfig, regedit, regedt32, sysprep, chmod, grep xinit, ifconfig,
ps, gunzip, …
8.8
Demonstrate the ability to make preparation for and recover
from system failures
8.9
Recognise and interpret common error codes and implement
suitable recovery procedures, e.g., BSODs, Last Known Good
configuration, boot with extensions off …
8.10
Recognise when to use common diagnostic utilities and system
tools to perform elementary maintenance of system software
Units
The specific learning outcomes are grouped into 4 units.
Unit 1
Unit 2
Unit 3
Unit 4
Principles of Computer Filing Systems
Configuration and Maintenance of Systems Software
Computer Security
Troubleshooting
Specific Learning
Outcomes
Unit 1
Principles of Computer Filing Systems
Learners should be able to:
10.1.1
Define what is meant by the term computer filing system
10.1.2
Identify the major desktop components and interfaces and state
their functions on a variety of operating systems
10.1.3
Identify the names, locations, purposes, and contents of major
system files in contemporary MS Windows systems, e.g., io.sys,
msdos.sys, config.sys, ntdetect.com, ntuser.dat, etc
10.1.4
Identify the names, locations, purposes, and contents of major
system files in contemporary Linux/Unix system files, e.g.,
LILO, GRUB, init, crontab, mount, mtools, xf86config, etc
10.1.5
Identify the names, locations, purposes, and contents of major
system files in contemporary MacOS system files, e.g., Finder,
Chooser, System Folder, Extensions Manager, etc
10.1.6
Explain what is meant by the terms linked library, virtual
machine, swap file, swap partition
10.1.7
Recognise the difference between the fundamental file systems,
e.g., FAT32, NTFS, Ext2, Ext3, Darwin, FreeBSD
10.1.8
Format and partition a hard disk to support one or more file
system types
1
10.1.9
Explain how various filing systems use services and system
utilities to accommodate access to and processing of files
10.1.10
Navigate root directories, subdirectories and system paths using
a command line interface (VDOS, bash, etc) and a GUI (Finder,
X-Windows, etc)
10.1.11
Explain and demonstrate the use of piping, filtering, wildcards,
redirecting, aliasing
10.1.12
Distinguish between the file and folder naming techniques as
used in Windows, Unix/Linux and MacOS operating systems
10.1.13
Create, rename, move, copy, edit, sort and delete files and
folders in a variety of different system environments
10.1.14
Associate files of an unknown file type with the correct
program or utility
Unit 2
Configuration and Maintenance of Systems Software
Learners should be able to:
10.2.1
Understand the need for regular maintenance/upgrade of the
operating system
10.2.2
Install system updates and service packs on a variety of
operating systems, as appropriate, e.g., Windows Update,
MacOS Software Update, rpm …
10.2.3
Install, configure and test networking devices on a variety of
operating systems, e.g., modems, NICs …
10.2.4
Install, configure and test networking services on a variety of
operating systems
10.2.5
Harden a variety of operating systems using appropriate system
utilities and third party utilities, e.g., BIOS, IPSec, ssh,
enumerated services, security templates, firewalls, anti-virus
software …
10.2.6
Install, configure and test distributed software utilities on a
variety of operating systems, e.g., Samba, PC-Mac-Net
FileShare, PPP to RAS, Mac-on-Linux …
10.2.7
Install and configure a boot manager
10.2.8
Configure and implement a dual boot computer system
10.2.9
Share specific system resources and system devices between
disparate operating systems
10.2.10
Compile and analyse a benchmark profile using an appropriate
distributed system utility, e.g., Ethereal, MSBA, LanGuard …
10.2.11
Use virtual desktops and operating system emulators, e.g.,
Virtual PC, dosemu , VNC, GuestPC …
2
Unit 3
Computer Security
Learners should be able to:
10.3.1
Explain the need for security with regard to computer systems
10.3.2
Identify 3 possible threats to an unsecured computing
environment
10.3.3
Configure and implement a local system security policy
10.3.4
Develop security benchmarks for a variety of operating systems
10.3.5
Outline and deploy simple strategies for overcoming the more
common threats to the security of a computer system
10.3.6
Explain what is meant by the terms threat model, honeypot, risk
avoidance, foot printing, rootkit, backdoor, DoS
10.3.7
Configure and deploy security based software utilities on a
variety of operating systems, e.g., PortScan, finger,
AntiSpyware, etc
10.3.8
Identify, analyse and remove the presence of a virus infection
and/or spyware infection
10.3.9
Identify, analyse and remove the presence of a spam engine
and/or infection
10.3.10
Identify, analyse and remove the presence of a rootkit
Unit 4
Troubleshooting
Learners should be able to:
10.4.1
Identify the more common operational and usability problems
within a computer system and develop a plan for resolving them
10.4.2
Document, log or record all information regarding the nature of
the problem and the preferred solution if obtainable
10.4.3
Distinguish between well-defined and ill-defined problems
10.4.4
Distinguish between hardware and software errors
10.4.5
Install, configure and implement standard system diagnostic
tools, e.g., perfmon, netmon, ifconfig, dd …
10.4.6
Recognise and interpret common error codes and implement
suitable recovery procedures, e.g., MacOS system errors,
BSODs, Last Known Good Configuration, boot errors …
10.4.7
Develop and implement a password recovery policy
10.4.8
Establish electronic logging procedures to audit important
system events
10.4.9
Create and utilise emergency repair disks
3
11
10.4.10
Create and deploy standard disk images for use in system
recovery scenarios
10.4.11
Use system help files and other system resources as appropriate
Portfolio of
Assessment
Summary
11.1
Skills
Demonstration
Please refer to the glossary of assessment techniques and the
note on assessment principles at the end of this module
descriptor.
All assessment is carried out in accordance with FETAC
regulations.
Assessment is devised by the internal assessor, with external
moderation by FETAC.
Skills Demonstration
Examination
70%
30%
The internal assessor will devise a brief that requires candidates
to produce evidence that demonstrates an understanding and
application of a range of specific learning outcomes.
Specifically, candidates will be expected to demonstrate a
competency in installing, securing and configuring both a
Microsoft Windows system and a non-Microsoft Windows
system in a dual-boot environment.
In both skills demonstrations, candidates will be assessed in a
broad range of practical skills and adherence to safe working
practices throughout.
11.2
Examination
The internal assessor will devise a theory-based examination
that assesses the candidate’s ability to recall and apply theory
and understanding, requiring responses to a range of structured
questions. These questions may be answered in different media
such as in writing or orally.
The examination will be based on a range of learning outcomes
and will be 2 hours in duration.
The format of the examination will be as follows:
6 structured questions.
Candidates are required to answer 4 (100 marks each).
12
Grading
Pass
Merit
Distinction
50 - 64%
65 - 79%
80 - 100%
4
Individual Candidate
Marking Sheet 1
Systems Software
C30255
Skills Demonstration 70%
Candidate Name: _______________________________ PPSN: _________________________
Centre: __________________________________________________ Centre No.: __________
Assessment Criteria
Maximum
Mark
Configuring a Dual-Boot Computer System
• appropriate preparation of hard disk(s)
• appropriate use of software set- up tools and procedures
• securing/optimising a dual-boot computer system
• configuration of local security policies
• demonstrating a mastery of navigating filing system(s)
• show evidence of critical analysis and reasoning skills
10
20
20
15
15
10
Subtotal
90
System Software Administration
• appropriate preparation and planning
• creating a baseline computer system
• safe use and careful deployment of system software utilities,
i.e., diagnostics, testing …
• identify and remove a virus, spyware infection and rootkit
• recover a failed computer system
• share a peripheral device between two disparate comp uter
systems
• show evidence of critical analysis and reasoning skills
Subtotal
TOTAL MARKS
This mark should be transferred to the Module Results Summary Sheet
Candidate
Mark
10
10
15
15
15
15
10
90
180
Internal Assessor’s Signature: __________________________________ Date: _____________
External Authenticator’s Signature: _____________________________ Date: _____________
5
Systems Software
C30255
Individual Candidate
Marking Sheet 2
Examination (Theory -Based) 30%
Candidate Name: _______________________________ PPSN: _________________________
Centre: __________________________________________________ Centre No.: __________
Maximum
Mark
Assessment Criteria
Candidate
Mark
Structured Questions
6 structured questions, answer any 4 (100 marks each).
(Indicate questions answered)
Question No:.
______
______
______
______
TOTAL MARKS
This mark should be transferred to the Module Results Summary Sheet
40
40
40
40
120
Internal Assessor’s Signature: __________________________________ Date: _____________
External Authenticator’s Signature: _____________________________ Date: _____________
6