Topqualityworka
I Provide High quality work at a low price. You may find other documents on the Internet or this website however they don't always cover all the BTEC Criteria. This is why my work has the best standards and COVERS ALL THE CRITERIA, i go into a lot of detail from pass to distinction tasks, so you can use it as a guide/ template. Each piece of works takes around 3-4 hours and I only ask for a small contribution of your money.
- 100
- 0
- 4
Community
- Followers
- Following
423 Reviews received
104 items
Computer Science Dissertation (Mobile Application)
Carpooling has become a more convenient way for modern society to interact, travel and save costs on transportation. A carpooling team would share a vehicle for their commute effectively reducing congestion on the road. This project presents the mobile application designed to tackle common safety and user interaction issues within modern carpooling apps on the market. The project not only allows for simple effective carpooling, but also maximizes the possibilities of user interaction between the...
- Thesis
- • 123 pages •
Carpooling has become a more convenient way for modern society to interact, travel and save costs on transportation. A carpooling team would share a vehicle for their commute effectively reducing congestion on the road. This project presents the mobile application designed to tackle common safety and user interaction issues within modern carpooling apps on the market. The project not only allows for simple effective carpooling, but also maximizes the possibilities of user interaction between the...
BTEC IT Level 2 Unit 14- Computer systems
All tasks included up to Pass, Merit and Distinction Standards.

Very cheap bundle at a great price, any questions feel free to message me.

Thanks
- Package deal
- • 8 items •
- D2- Check a computer system for security risks using a range of software utilities • Essay
- D1- Evaluate any changes to the system • Essay
- P7- Identify potential security risks • Essay
- P6- Configure software for a given user requirement • Essay
- P5- Connect hardware safely to a computer system, testing for functionality • Essay
- And more ….
All tasks included up to Pass, Merit and Distinction Standards.

Very cheap bundle at a great price, any questions feel free to message me.

Thanks
P1- Identify the common components of a computer system
For P1, learners must identify the different types of hardware
and software components of a computer system. Evidence
could be in the form of a presentation or video of the learner
identifying the components
- Essay
- • 18 pages •
For P1, learners must identify the different types of hardware
and software components of a computer system. Evidence
could be in the form of a presentation or video of the learner
identifying the components
P2- Describe the purpose of different types of computer systems
For P2, learners must describe the purposes of different
computer systems. They should identify different computer
systems and describe why they are used. The evidence
could take the format of an audio recording of a discussion
with the learner, a video of them giving a presentation, the
presentation slides and speaker’s notes, a report or a leaflet.
For merit criterion M1, learners could extend their evidence or
P2 to include the benefits of the different computer systems for
different purpos...
- Essay
- • 5 pages •
For P2, learners must describe the purposes of different
computer systems. They should identify different computer
systems and describe why they are used. The evidence
could take the format of an audio recording of a discussion
with the learner, a video of them giving a presentation, the
presentation slides and speaker’s notes, a report or a leaflet.
For merit criterion M1, learners could extend their evidence or
P2 to include the benefits of the different computer systems for
different purpos...
P3- Represent how data flows around a computer system
For P3, learners must represent how data flows around a
computer system; this could be using annotated diagrams
and or flow charts. The representation must include the input,
memory, processing and output aspects of the flow of data
- Package deal
- Essay
- • 1 pages •
For P3, learners must represent how data flows around a
computer system; this could be using annotated diagrams
and or flow charts. The representation must include the input,
memory, processing and output aspects of the flow of data
P4- Specify suitable components to meet user requirements
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
- Package deal
- Essay
- • 10 pages •
For P4, learners must specify the components to be used to
create a computer system for a specified end user. This should
include hardware components, any peripherals, software
systems, application software and utilities which they would
recommend. Evidence for this could be in the form of a
presentation, report, video/audio discussion.
M3- Justify that the chosen software meets a given user requirement
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
- Package deal
- Essay
- • 3 pages •
For merit criterion M3, learners must provide a justification as
to why the configuration that they have carried out meets the
needs of the specified end user. This could be included as a verbal
justification during the video of the customisation, response to
questions from the teacher, additional annotation of the screen
captures, a presentation or report.
P5- Connect hardware safely to a computer system, testing for functionality
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
- Package deal
- Essay
- • 10 pages •
For P5, learners must provide evidence of connecting
hardware to a computer system and test the functionality
of the system. The learners should connect at least three
hardware components, one of which should be internal to
the system. The evidence could be in the form of a video,
series of annotated photographs or detailed observation of
the learner connecting the hardware. The learners should
be demonstrating safe working practices. The learners
must also include a test plan with the headings ...
P6- Configure software for a given user requirement
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
- Package deal
- Essay
- • 8 pages •
For P6, learners must configure at least two pieces of software
to meet the needs of a specified user. Evidence could be in
the form of a video, detailed observation or annotated screen
captures.
P7- Identify potential security risks
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
- Package deal
- Essay
- • 4 pages •
For P7, learners must identify the potential security risks
that can apply to a computer system. The computer system
should be the same system that they have been been
configuring software on. The evidence could be presented as
a recorded discussion, presentation with speaker notes (which
could also be videoed) or a report.
P1- Explain the features of two contrasting businesses
P1- Explain the features of two contrasting businesses
P1- Explain the features of two contrasting businesses
P2- Explain how two contrasting businesses are influenced by stakeholders
P3- Describe factors and features that determine the appeal of two leisure destinations in Europe for different types of visitors Part 1