Course Title: Support computer hardware and software for engineering applications

Part B: Course Detail

Teaching Period: Term1 2015

Course Code: EEET7067C

Course Title: Support computer hardware and software for engineering applications

School: 130T Vocational Engineering

Campus: City Campus

Program: C6121 - Advanced Diploma of Computer Systems Engineering

Course Contact: Program Manager

Course Contact Phone: +61 3 9925 4468

Course Contact Email: vocenengineering@rmit.edu.au


Name and Contact Details of All Other Relevant Staff

Divya Anshu Bhardwaj
Phone: +61 3 9925 4163
Email: divya.bhardwaj@rmit.edu.au
 


 

Nominal Hours: 120

Regardless of the mode of delivery, represent a guide to the relative teaching time and student effort required to successfully achieve a particular competency/module. This may include not only scheduled classes or workplace visits but also the amount of effort required to undertake, evaluate and complete all assessment requirements, including any non-classroom activities.

Pre-requisites and Co-requisites

UEENEED102A & UEENEEE101A
 

Course Description

This unit covers upgrading and maintaining computers, computer devices and peripherals and installing, maintaining and configuring software. It encompasses safe working practices, installing and testing the upgrading components, locating faults in hardware components, replacing faulty subsystems, installing and testing the operating system and application software, testing functionality, rectifying malfunctions, following written and oral instruction and procedures and applying appropriate customer relations.


National Codes, Titles, Elements and Performance Criteria

National Element Code & Title:

UEENEED112A Support computer hardware and software for engineering applications

Element:

1 Prepare to upgrade and maintain computer hardware and software.

Performance Criteria:

1.1 OHS procedures for a given work area are
identified, obtained and understood.
1.2 Established OHS risk control measures and
procedures are followed in preparation for the
work.
1.3 Appropriate person(s) are consulted to determine
the nature of computer or peripheral
hardware/software upgrading or maintenance.
1.4 Appropriate personnel are consulted to ensure
the work is co-ordinated effectively with others
affected by the work.
1.5 Hardware subsystems needed to upgrade or
maintain computers and peripherals are obtained
in accordance with established procedures and
checked against job requirements. (See Note 1)
1.6 Software versions are deployed in accordance
with established procedures and checked against
job requirements. (See Note 2)


Note:
1. Example of materials are motherboards, processors and
memory modules.
2. Example include complete version update, incremental
(download) updates and security and bug patches.

Element:

2 Upgrade computer hardware and software.

Performance Criteria:

2.1 OHS risk control measures and procedures for
carrying out the work are followed.
2.2 Computers are checked as being isolated where
necessary in strict accordance OHS requirements
and procedures.
2.3 Computers and peripherals are dismantled as
needed for upgrading in accordance with service
manual instructions or industry practices, and
parts stored to prevent loss or damage.
2.4 Upgrading components are fitted and
computer/peripheral apparatus is reassembled in
accordance with service manual instructions or
industry practices.
2.5 Upgrading software components are installed
and accordance with service manual instructions
or industry practices.
2.6 Operating system, including device drivers and
application software are tested in preparation for
return to service/customer. (See Note 3)
2.7 Computer/peripheral apparatus is tested and
prepared for return to customer.

Note 3
Examples include Internet access, word processing,
spreadsheet, graphics, publishing and industrial
applications.
 

Element:

3 Maintain operation of computer hardware and software.

Performance Criteria:

3.1 OHS risk control measures and procedures for
carrying out the work are followed.
3.2 The need to test or measure live is determined in
strict accordance with OHS requirements and
when necessary conducted within established
safety procedures.
3.3 Computers are checked as being isolated where
necessary in strict accordance OHS requirements
and procedures.
3.4 Computers and peripherals are dismantled as
needed to find and rectify faults in accordance
with service manual instructions and industry
practices, and parts stored to prevent loss or
damage.
3.5 Faults are identified using logical techniques
drawing on knowledge of computer/peripheral
hardware components and measured values of
operating parameters.
3.6 Faulty components are rechecked and their fault
status confirmed.
3.7 Operating system malfunctions are identified
using logical techniques drawing on knowledge
of operating system configuration requirements.
3.8 Device driver malfunctions are identified using
logical techniques drawing on knowledge of
device driver software configuration
requirements.
3.9 Application software malfunctions are identified
using logical techniques drawing on knowledge
of software configuration requirements.
3.10 Malfunctions are rectified using latest software
versions, incremental updates and bug and
security patches.
3.11 Computer hardware/peripheral device, operating
system, including device drivers, and application
software are tested in preparation for return to
service/customer.
3.12 Redundant files are removed and disposed of or
archived in accordance with established
procedures.
3.13 Methods for dealing with unexpected situations
are selected on the basis of safety and specified
work outcomes.
3.14 Maintenance is carried out efficiently without
waste of materials and energy or damage to
apparatus, the surrounding environment or other
services.
 

Element:

4 Complete and report upgrading and maintenance activities.

Performance Criteria:

4.1 OHS work completion risk control measures and
procedures are followed.
4.2 Work area is cleaned and made safe in
accordance with established procedures.
4.3 Written justification is produced for hardware
software upgrading and maintenance.
4.4 Upgrading and maintenance is documented and
appropriate person(s) notified in accordance with
established procedures.


Learning Outcomes


Refer to Elements


Details of Learning Activities

You will involve in the following learning activities to meet requirements for this competency and stage 1 competencies for Engineering Associates.
• Lecture
• Practical Exercises


Engineers Australia Mapping Information:
This course is mapped against stage 1 competencies for Engineering Associates developed by Engineers Australia as detailed below:

This course is mapped against stage 1 competencies for Engineering Associates developed by Engineers Australia as detailed below:

EA 1. Knowledge and Skill Base

EA1.1. Descriptive, formula-based understanding of the underpinning natural and physical sciences and the engineering fundamentals applicable to the practice area.
EA 1.2. Procedural-level understanding of the mathematics, numerical analysis, statistics, and computer and information sciences which underpin the practice area.
EA 1.3. In depth practical knowledge and skills within specialist sub-disciplines of the practice area.
EA 1.4. Discernment of engineering developments within the practice area.
EA 1.5. Knowledge of contextual factors impacting the practice area.
EA 1.6. Understanding of the scope, principles, norms, accountabilities and bounds of contemporary engineering practice in the area of practice.

EA 2. Engineering Application Ability

EA 2.1. Application of established technical and practical methods to the solution of well-defined engineering problems.
EA 2.2. Application of technical and practical techniques, tools and resources to well defined engineering problems.
EA 2.3. Application of systematic synthesis and design processes to well defined engineering problems.
EA 2.4. Application of systematic project management processes.

EA 3. Professional and Personal Attributes

EA 3.1. Ethical conduct and professional accountability.
EA 3.2. Effective oral and written communication in professional and lay domains.
EA 3.3. Creative, innovative and pro-active demeanour.
EA 3.4. Professional use and management of information.
EA 3.5. Orderly management of self, and professional conduct.
EA 3.6. Effective team membership and team leadership


Engineers Australia Stage 1 Competencies are mapped with competency UEENEED112A  in the Assesment Matrix.


Teaching Schedule

The proposed teaching schedule for this competency is detailed below:

 

Week Topics Delivered Elements/Performance Criteria
1 Introduction to Windows 7
Lecture: Assign the Lab Journal to be handed in during week 34. A sample of the lab journal is to be submitted in week 4 for feedback. Windows 7 Versions, new and enhanced features of Windows 7, user interface, hardware requirements and system support
Lab: Activities 1-1, 1-2, 1-3 
 
1.1, 1.2, 1.5, 2.1, 2.2, 2.3, 2.4, 3.1, 3.2, 3.3, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
2 Introduction to Windows 7
Lecture: Application support, connectivity applications, networking models, chapter summary
Lab: Activities 1-4, 1-5 

 
1.1, 1.2, 1.5, 2.1, 2.2, 2.3, 2.4, 3.1, 3.2, 3.3, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
3 Installing Window 7
Lecture: Deployment enhancements in Windows 7, installation methods, installation types, Windows easy transfer
Lab: Activities 2-1, 2-2, 2-3, 2-4, 2-5 

 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
4 Installing Windows 7
Lecture: Attended installation, unattended installation, image-based installation, chapter summary
Lab: Activities 2-6, 2-7, 2-8, 2-9, Lab Journal review and feedback

 
1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
5 Using the system utilities
Lecture: Control panel overview, administrative tools, hardware management
Lab: Activities 3-1, 3-2, 3-3, 3-4, 3-5, 3-6 

 
1.1, 1.2, 1.4, 1.5, 2.1, 2.2, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
6 Using the system utilities
Lecture: Power management, display, chapter summary
Lab: Activities 3-7, 3-8, 3-9, 3-10, 3-11
 
1.1, 1.2, 1.4, 1.5, 2.1, 2.2, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
7 Managing disks
Lecture: Disk technology, partition styles, types of disk partitions
Lab: Activities 4-1, 4-2, 4-3 

 
1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 2.4, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
8 Managing disks
Lecture: Disk management tools, disk management tasks
Lab: Activities 4-4, 4-5, 4-6, 4-7 
 
1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 2.4, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
9 Managing disks
Lecture: Partition and volume management, virtual disk management tasks, chapter summary
Lab: Activities 4-8, 4-9, 4-10, 4-11.
 
1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 2.4, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
10 Managing file systems
Lecture: Supported file systems, file system tasks, file and folder attributes
Lab: Activities 5-1, 5-2, 5-3 

 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
11 Managing file systems
Lecture: File and folder permissions, previous versions, chapter summary
Lab: Activities 5-4, 5-5, 5-6 

 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.11, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
12 User management
Lecture: User Accounts, creating users, managing profiles
Lab: Activities 6-1, 6-2, 6-3 
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
13 User management
Lecture: Network integration, parental controls, chapter summary
Lab: Activities 6-4, 6-5, 6-6, 6-7 

 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
14 Windows 7 security features
Lecture: Windows 7 security improvements, security policies, auditing
Lab: Activities 7-1, 7-2, 7-3, 7-4
 
 1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
15 Windows 7 security features
Lecture: User account control, malware protection, data security
Lab: Activities 7-5, 7-6, 7-7, 7-8
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
16 Revision and Practical Test 1
Lecture: Revision
Lab: Practical Test 1
 
 1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
17-18 RMIT University Examination weeks  
19 Windows 7 security features
Lecture: Windows update, action centre, chapter summary
Lab: Activities 7-9, 7-10, 7-11, 7-12
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
20 Networking
Lecture: Networking overview, network architecture, IP Version 4, IP Version 6, file sharing, Internet connectivity
Lab: Activities 8-1, 8-2, 8-3, 8-4, 8-5, 8-6
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
21 Networking
Lecture: Wireless networking, Windows firewall, network bridging, ad-hoc and home group networks, chapter summary
Lab: Activities 8-7, 8-8, 8-9, 8-10
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
22 User productivity tools
Lecture: Printing, Windows fax and scan, Windows explorer
Lab: Activities 9-1, 9-2, 9-3, 9-4, 9-5, 9-6, 9-7
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 3.5, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
23 User productivity tools
Lecture: Search, Internet Explorer 8, chapter summary
Lab: Activities 9-8, 9-9, 9-10, 9-11, 9-12, 9-13
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.4, 2.5, 2.6, 3.1, 3.2, 3.3, 3.5, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
24 Performance tuning
Lecture: Performance enhancements, performance tuning overview, performance monitor
Lab: Activities 10-1, 10-2, 10-3, 10-4
 
1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
 25  Performance tuning
Lecture: Task manager, performance ranking, performance options, chapter summary
Lab: Activities 10-5, 10-6, 10-7, 10-8
 
 1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
26 Application support
Lecture: Application architecture, supported application environments, Windows 7 registry, file and registry virtualisation, run as administrator
Lab: Activities 11-1, 11-2, 11-3, 11-4, 11-5
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
27 Application support
Lecture: Application compatibility, application compatibility research tools, application control policies, chapter summary
Lab: Activities 11-6, 11-7, 11-8, 11-9, 11-10
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.7, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
28 Disaster recovery and troubleshooting
Lecture: General principles of troubleshooting, Windows backup and restore
Lab: Activities 12-1, 12-2, 12-3, 12-4, 12-5
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
29 Disaster recovery and troubleshooting
Lecture: Repairing Windows 7, preventative maintenance, advanced troubleshooting, chapter summary
Lab: Activities 12-6, 12-7, 12-8, 12-9, 12-10
 
1.1, 1.2, 1.3, 1.4, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
30 Enterprise Computing
Lecture: Active directory, group policy, controlling device information, deployment planning
Lab: Activities 13-1, 13-2, 13-3, 13-4
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
31 Enterprise Computing
Lecture: Enterprise deployment tools, Windows server update services, network access protection, chapter summary
Lab: Activities 13-5, 13-6, 13-7
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
32 Remote Access
Lecture: Remote access and remote control overview, remote access dial-up connectivity, remote access VPN connectivity
Lab: Activities 14-1, 14-2, 14-3, 14-4
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
33 Remote Access
Lecture: Direct access, remote desktop, remote assistance, branch cache, sync centre, mobility centre, chapter summary
Lab: Activities 14-5, 14-6, 14-7
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
34 Lecture: Revision
Lab: Practical Test 2
Engineering Journal submission
 
1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4
35-36 Closed Book Test 1.1, 1.2, 1.3, 1.4, 1.6, 2.1, 2.2, 2.5, 2.6, 2.7, 3.1, 3.2, 3.3, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 4.1, 4.2, 4.3, 4.4

• Student directed hours involve completing activities such as reading online resources, assignments, individual student-teacher course-related consultation. Students are required to self-study the learning materials and complete the assigned out of class activities for the scheduled non-teaching hours. The estimated time is 25 hours outside the class time.


Learning Resources

Prescribed Texts

MCTS Guide to Microsoft Windows 7 (Exam# 70-680), Wright & Plesniarski

9781111309770


References


Other Resources

Blackboard
 


Overview of Assessment

The assessment is conducted in both theoretical and practical aspects of the course according to the performance criteria set in the National Training Package. Assessment may incorporate a variety of methods including written/oral activities and demonstration of practical skills to the relevant industry standards. Participants are advised that they are likely to be asked to personally demonstrate their assessment activities to their teacher/assessor. Feedback will be provided throughout the course. To successfully complete this course you will be required to demonstrate competency in each assessment task detailed under Assessment Tasks: 

Assessment 1: Practical Test

Weighting towards final grade (%): 50

Assessment 2: Reflective Journal

Weighting towards final grade (%): 20 

Assessment 3: Closed Book Test

Weighting towards final grade (%): 30

these tasks assesses the following Course Learning Outcomes (CLOs):  

Assessment Mapping Matrix 

Element/

Performance Criteria Covered

Practical Test

Reflective Journal

Closed Book Test

1.1

x

x

 

1.2

x

x

 

1.3

x

   

1.4

x

   

1.5

x

 

x

1.6

x

   

2.1

x

x

x

2.2

x

 

x

2.3

x

x

 

2.4

x

   

2.5

x

   

2.6

x

x

x

2.7

x

x

 

3.1

x

x

 

3.2

x

x

 

3.3

x

 

x

3.4

 

x

x

3.5

 

x

x

3.6

 

x

x

3.7

 

x

x

3.8

 

x

x

3.9

 

x

x

3.10

x

x

 

3.11

x

x

 

3.12

x

x

 

3.13

x

x

 

3.14

x

x

 

4.1

x

 

x

4.2

x

 

x

4.3

x

x

 

4.4

x

x

 


Assessment Tasks

• Practical Test 1, 20%
• Practical Test 2, 20%
• Engineering Journal, 20%
• Closed Book Test, 40%

This course is graded as Competent or Not Yet Competent and subsequently the following course grades are allocated:

80 - 100: CHD - Competent with High Distinction
70 - 79: CDI - Competent with Distinction
60 - 69: CC - Competent with Credit
50 - 59: CAG - Competency Achieved - Graded
0 - 49: NYC - Not Yet Competent
DNS - Did Not Submit for Assessment.
 


Assessment Matrix

 Assessment vs UEENEED112A Elements & Performance Criteria

  UEENEED112A Elements & Performance Criteria
Assessments 1.1 1.2 1.3 1.4 1.5 1.6 2.1 2.2 2.3 2.4 2.5 2.6 2.7 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 3.12 3.13 3.14 4.1 4.2 4.3 4.4
Practical Test 1 x x  x x x x x  x  x x x x x x x  x              x  x  x  x  x  x  x  x  x
Practical Test 2 x x x x x x x  x  x  x  x  x  x  x  x  x              x  x  x  x  x  x  x  x
Engineering Journal x x         x   x     x  x  x  x    x  x  x  x  x  x  x  x  x  x  x      x  x
Closed Book Test         x   x x       x       x x x x x  x  x            x  x    

 Assessment vs Engineers Australia Stage 1 Competencies

Engineers Australia Stage 1 Competencies
  EA1.1 EA1.2 EA1.3 EA1.4 EA1.5 EA1.6 EA2.1 EA2.2 EA2.3 EA2.4 EA3.1 EA3.2 EA3.3 EA3.4 EA3.5 EA3.6
Practical Test 1     X X X   X X     X X X X X X
Practical Test 2     X  X X   X X     X X X X X X
Engineering Journal X   X X X    X X      X  X  X  X X  
Closed Book Test      X   X   X X  X     X      X  
All Assessments
UEENEED112A
1
  3 3 3   3 3 1   3 3 3 3 3 2
 0 (Blank)     Graduate attribute is not assessed.        
 1      Graduate attribute is assessed in at least one, but less than one-third, of the Element
 2      Graduate attribute is assessed in at least one third, but less than two-thirds, of the Element           
 3     Graduate attribute is assessed in more than two-thirds of the Element         

Other Information

 Credit Transfer and/or Recognition of Prior Learning (RPL):

You may be eligible for credit towards courses in your program if you have already met the learning/competency outcomes through previous learning and/or industry experience. To be eligible for credit towards a course, you must demonstrate that you have already completed learning and/or gained industry experience that is:

• Relevant
• Current
• Satisfies the learning/competency outcomes of the course

Please refer to http://www.rmit.edu.au/students/enrolment/credit to find more information about credit transfer and RPL.

Study and Learning Support:

Study and Learning Centre (SLC) provides free learning and academic development advice to you. Services offered by SLC to support your numeracy and literacy skills are:
• Assignment writing, thesis writing and study skills advice
• Maths and science developmental support and advice
• English language development

Please refer to http://www.rmit.edu.au/studyandlearningcentre to find more information about Study and Learning Support.

Disability Liaison Unit:

If you are suffering from long-term medical condition or disability, you should contact Disability Liaison Unit to seek advice and support to complete your studies.

Please refer to http://www.rmit.edu.au/disability to find more information about services offered by Disability Liaison Unit.

Late Submission:

If you require an Extension of Submittable Work (assignments, reports or project work etc.) for seven calendar days or less (from the original due date) and have valid reasons, you must complete an Application for Extension of Submittable Work (7 Calendar Days or less) form and lodge it with the Senior Educator/ Program Manager.

The application must be lodged no later than one working day before the official due date. You will be notified within no more than two working days of the date of lodgement as to whether the extension has been granted.

If you seek an Extension of Submittable Work for more than seven calendar days (from the original due date), you must lodge an Application for Special Consideration form under the provisions of the Special Consideration Policy, preferably prior to, but no later than two working days after the official due date.

Submittable Work (assignments, reports or project work etc.) submitted late without approval of an extension will not be accepted or marked.

Special Consideration:

Please refer to http://www.rmit.edu.au/students/specialconsideration to find more information about special consideration.

Plagiarism:

Plagiarism is a form of cheating and it is very serious academic offence that may lead to expulsion from the university.

Please refer to http://www.rmit.edu.au/academicintegrity to find more information about plagiarism.

Email Communication:

All email communications will be sent to your RMIT email address and you must regularly check your RMIT emails.
 

Course Overview: Access Course Overview