Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
The Further Education and Training Awards Council (FETAC) was set up as a statutory body on 11 June 2001 by the Minister for Education and Science. Under the Qualifications (Education & Training) Act, 1999, FETAC now has responsibility for making awards previously made by NCVA. Module Descriptor Systems Software Level 6 C30255 www.fetac.ie 1 Module Title Systems Software 2 Module Code C30255 3 Level 6 4 Credit Value 1 credit 5 Purpose This module is a statement of the standards to be achieved to gain a FETAC credit in Systems Software at Level 6. It is designed to provide a solid foundation for the student in the fundamentals of distributed computing systems. 6 Preferred Entry Level 7 8 Special Requirements An appropriate award at Level 5 Certificate in or equivalent qualifications and/or relevant life and work experiences. This should be delivered together with modules in Client/Server Networking and Network Theory General Aims Learners who successfully complete this module will: 8.1 Recognise that systems software complements a diversity of hardware platforms 8.2 Recognise that systems software presents the user with a uniform computing environment 8.3 Install, configure and optimise a variety of computer operating systems, e.g., Windows XP, Linux, MacOS … 8.4 Install, configure and optimise a variety of computer peripherals for operation between two or more disparate operating systems 8.5 Use appropriate procedures to manage a variety of major operating system subsystems, e.g, virtual memory, file systems, networking … 8.6 Identify the names, locations and purposes of major operating system files and folders, e.g. config.sys, autoexec.bat, winnt, ntdetect.com, ntoskrnl.exe, XF86Config, /bin, /etc, smbclient … 9 10 8.7 Identify and use major operating system utilities and tools, e.g. msconfig, regedit, regedt32, sysprep, chmod, grep xinit, ifconfig, ps, gunzip, … 8.8 Demonstrate the ability to make preparation for and recover from system failures 8.9 Recognise and interpret common error codes and implement suitable recovery procedures, e.g., BSODs, Last Known Good configuration, boot with extensions off … 8.10 Recognise when to use common diagnostic utilities and system tools to perform elementary maintenance of system software Units The specific learning outcomes are grouped into 4 units. Unit 1 Unit 2 Unit 3 Unit 4 Principles of Computer Filing Systems Configuration and Maintenance of Systems Software Computer Security Troubleshooting Specific Learning Outcomes Unit 1 Principles of Computer Filing Systems Learners should be able to: 10.1.1 Define what is meant by the term computer filing system 10.1.2 Identify the major desktop components and interfaces and state their functions on a variety of operating systems 10.1.3 Identify the names, locations, purposes, and contents of major system files in contemporary MS Windows systems, e.g., io.sys, msdos.sys, config.sys, ntdetect.com, ntuser.dat, etc 10.1.4 Identify the names, locations, purposes, and contents of major system files in contemporary Linux/Unix system files, e.g., LILO, GRUB, init, crontab, mount, mtools, xf86config, etc 10.1.5 Identify the names, locations, purposes, and contents of major system files in contemporary MacOS system files, e.g., Finder, Chooser, System Folder, Extensions Manager, etc 10.1.6 Explain what is meant by the terms linked library, virtual machine, swap file, swap partition 10.1.7 Recognise the difference between the fundamental file systems, e.g., FAT32, NTFS, Ext2, Ext3, Darwin, FreeBSD 10.1.8 Format and partition a hard disk to support one or more file system types 1 10.1.9 Explain how various filing systems use services and system utilities to accommodate access to and processing of files 10.1.10 Navigate root directories, subdirectories and system paths using a command line interface (VDOS, bash, etc) and a GUI (Finder, X-Windows, etc) 10.1.11 Explain and demonstrate the use of piping, filtering, wildcards, redirecting, aliasing 10.1.12 Distinguish between the file and folder naming techniques as used in Windows, Unix/Linux and MacOS operating systems 10.1.13 Create, rename, move, copy, edit, sort and delete files and folders in a variety of different system environments 10.1.14 Associate files of an unknown file type with the correct program or utility Unit 2 Configuration and Maintenance of Systems Software Learners should be able to: 10.2.1 Understand the need for regular maintenance/upgrade of the operating system 10.2.2 Install system updates and service packs on a variety of operating systems, as appropriate, e.g., Windows Update, MacOS Software Update, rpm … 10.2.3 Install, configure and test networking devices on a variety of operating systems, e.g., modems, NICs … 10.2.4 Install, configure and test networking services on a variety of operating systems 10.2.5 Harden a variety of operating systems using appropriate system utilities and third party utilities, e.g., BIOS, IPSec, ssh, enumerated services, security templates, firewalls, anti-virus software … 10.2.6 Install, configure and test distributed software utilities on a variety of operating systems, e.g., Samba, PC-Mac-Net FileShare, PPP to RAS, Mac-on-Linux … 10.2.7 Install and configure a boot manager 10.2.8 Configure and implement a dual boot computer system 10.2.9 Share specific system resources and system devices between disparate operating systems 10.2.10 Compile and analyse a benchmark profile using an appropriate distributed system utility, e.g., Ethereal, MSBA, LanGuard … 10.2.11 Use virtual desktops and operating system emulators, e.g., Virtual PC, dosemu , VNC, GuestPC … 2 Unit 3 Computer Security Learners should be able to: 10.3.1 Explain the need for security with regard to computer systems 10.3.2 Identify 3 possible threats to an unsecured computing environment 10.3.3 Configure and implement a local system security policy 10.3.4 Develop security benchmarks for a variety of operating systems 10.3.5 Outline and deploy simple strategies for overcoming the more common threats to the security of a computer system 10.3.6 Explain what is meant by the terms threat model, honeypot, risk avoidance, foot printing, rootkit, backdoor, DoS 10.3.7 Configure and deploy security based software utilities on a variety of operating systems, e.g., PortScan, finger, AntiSpyware, etc 10.3.8 Identify, analyse and remove the presence of a virus infection and/or spyware infection 10.3.9 Identify, analyse and remove the presence of a spam engine and/or infection 10.3.10 Identify, analyse and remove the presence of a rootkit Unit 4 Troubleshooting Learners should be able to: 10.4.1 Identify the more common operational and usability problems within a computer system and develop a plan for resolving them 10.4.2 Document, log or record all information regarding the nature of the problem and the preferred solution if obtainable 10.4.3 Distinguish between well-defined and ill-defined problems 10.4.4 Distinguish between hardware and software errors 10.4.5 Install, configure and implement standard system diagnostic tools, e.g., perfmon, netmon, ifconfig, dd … 10.4.6 Recognise and interpret common error codes and implement suitable recovery procedures, e.g., MacOS system errors, BSODs, Last Known Good Configuration, boot errors … 10.4.7 Develop and implement a password recovery policy 10.4.8 Establish electronic logging procedures to audit important system events 10.4.9 Create and utilise emergency repair disks 3 11 10.4.10 Create and deploy standard disk images for use in system recovery scenarios 10.4.11 Use system help files and other system resources as appropriate Portfolio of Assessment Summary 11.1 Skills Demonstration Please refer to the glossary of assessment techniques and the note on assessment principles at the end of this module descriptor. All assessment is carried out in accordance with FETAC regulations. Assessment is devised by the internal assessor, with external moderation by FETAC. Skills Demonstration Examination 70% 30% The internal assessor will devise a brief that requires candidates to produce evidence that demonstrates an understanding and application of a range of specific learning outcomes. Specifically, candidates will be expected to demonstrate a competency in installing, securing and configuring both a Microsoft Windows system and a non-Microsoft Windows system in a dual-boot environment. In both skills demonstrations, candidates will be assessed in a broad range of practical skills and adherence to safe working practices throughout. 11.2 Examination The internal assessor will devise a theory-based examination that assesses the candidate’s ability to recall and apply theory and understanding, requiring responses to a range of structured questions. These questions may be answered in different media such as in writing or orally. The examination will be based on a range of learning outcomes and will be 2 hours in duration. The format of the examination will be as follows: 6 structured questions. Candidates are required to answer 4 (100 marks each). 12 Grading Pass Merit Distinction 50 - 64% 65 - 79% 80 - 100% 4 Individual Candidate Marking Sheet 1 Systems Software C30255 Skills Demonstration 70% Candidate Name: _______________________________ PPSN: _________________________ Centre: __________________________________________________ Centre No.: __________ Assessment Criteria Maximum Mark Configuring a Dual-Boot Computer System • appropriate preparation of hard disk(s) • appropriate use of software set- up tools and procedures • securing/optimising a dual-boot computer system • configuration of local security policies • demonstrating a mastery of navigating filing system(s) • show evidence of critical analysis and reasoning skills 10 20 20 15 15 10 Subtotal 90 System Software Administration • appropriate preparation and planning • creating a baseline computer system • safe use and careful deployment of system software utilities, i.e., diagnostics, testing … • identify and remove a virus, spyware infection and rootkit • recover a failed computer system • share a peripheral device between two disparate comp uter systems • show evidence of critical analysis and reasoning skills Subtotal TOTAL MARKS This mark should be transferred to the Module Results Summary Sheet Candidate Mark 10 10 15 15 15 15 10 90 180 Internal Assessor’s Signature: __________________________________ Date: _____________ External Authenticator’s Signature: _____________________________ Date: _____________ 5 Systems Software C30255 Individual Candidate Marking Sheet 2 Examination (Theory -Based) 30% Candidate Name: _______________________________ PPSN: _________________________ Centre: __________________________________________________ Centre No.: __________ Maximum Mark Assessment Criteria Candidate Mark Structured Questions 6 structured questions, answer any 4 (100 marks each). (Indicate questions answered) Question No:. ______ ______ ______ ______ TOTAL MARKS This mark should be transferred to the Module Results Summary Sheet 40 40 40 40 120 Internal Assessor’s Signature: __________________________________ Date: _____________ External Authenticator’s Signature: _____________________________ Date: _____________ 6