Assignment help
Join our 150К of happy users
Get original papers written according to your instructions and save time for what matters most.
Unit 1: Information Technology Systems Sample Pearson BTEC Assignment Brief
Sample Pearson BTEC Set Assignment Brief
Single Part Assessment
Unit 1: Information Technology Systems
For use with
Pearson International BTEC Level qualifications in Information Technology
Certificate/Extended Certificate/Foundation Diploma/Diploma/Extended Diploma
| Advised supervised hours | 20 hours |
For completion by the centre
| Qualification (select as appropriate) | Certificate/Subsidiary Diploma/Foundation Diploma/Diploma/Extended Diploma |
| Assessment date |
| Instructions to teachers/tutors and/or invigilators |
The Pearson Set Assignment will be assessed internally by the centre using the unit assessment criteria given in the qualification specification. The Set Assignment will be sampled by the Standards Verifier as part of the standards verification annual centre visit.
Conditions of supervision
The Pearson Set Assignment should be carried out under supervised conditions. We advise that the Set Assignment can be in more than one supervised session.
The Set Assignment must not be shared with learners before the supervised session that will be arranged by the centre. Teachers/tutors and invigilators should note that they are responsible for maintaining security and for reporting issues to Pearson.
Outcomes for Submission
Learners must complete this set assignment on a computer, using office productivity software. Learners must save their work regularly and ensure that all materials can be identified as their work.
Learners must submit their own, independent work as detailed in the set assignment.
| Instructions to learners |
Read the Set Assignment information carefully.
You will be asked to carry out specific written activities, under supervised conditions, using the information provided.
You must work independently at all times and must not share your work with other learners.
You must complete ALL activities.
| Set Assignment information |
Berimbolo Security sells and installs security systems for homes and small businesses. The company has recently seen an increase in demand for the services it provides. To meet this demand it will employ more staff and move to new office premises. These office premises do not have any infrastructure installed.
The company currently employs two people; Royce and Rickson Berimbolo, the brothers who started the company. A further four people have been employed to start work when the company moves to the new premises. The company uses a single laptop computer for all their IT requirements.
You have been hired by Berimbolo Security as an information technology (IT) professional to help the brothers plan how they should use IT to meet the needs of their growing business.
Table 1 gives information on the expected needs of the company as it grows. The table includes details of staff, key tasks to be performed and the IT requirements of the business.
| Staff information | |
| Name and job role | Tasks to perform |
| Royce and Rickson Berimbolo – company owners (remote working and office based) |
|
| James De Sousa and Sarah Micklethwaite – office staff (office based) |
Carrying out public relations. |
| Lu Chen and Darren Williams – engineers (remote working) |
|
| IT requirements | |
| |
| Additional information | |
Berimbolo provide options for the security systems to be installed. These include:
| |
Table 1
| Set Assignment |
You must complete ALL activities.
| ACTIVITY 1 – suggested time 6 hours |
Produce a report for Royce and Rickson Berimbolo, evaluating how IT infrastructure could be used to meet the needs of Berimbolo Security. The report should:
It is suggested that you use a combination of written, tabulated and diagrammatic information in your report. This activity covers learning aim A – A.P1, A.P2, A.P3, A.M1, A.D1 |
| ACTIVITY 2 – suggested time 6 hours |
Produce a report for Royce and Rickson Berimbolo, analysing how data and information can be used to meet the needs of Berimbolo Security and its stakeholders. The report should consider:
This activity covers learning aim B – B.P4, B.P5, B.M2 |
| ACTIVITY 3 – suggested time 5 hours |
Berimbolo Security requires policy documents to communicate how IT should be used in the company. Produce policy documents for Berimbolo Security, detailing how the company’s staff should make use of IT so that they operate in a legal, moral, ethical and safe manner. The policies should cover issues associated with Berimbolo Security’s use of IT and how these can be addressed, including:
This activity covers learning aim C – C.P6, C.P7, C.P8 |
| ACTIVITY 4 – suggested time 3 hours |
Royce and Rickson Berimbolo have asked you to justify the recommendations you have made for their company in Activities 2 and 3. You must evaluate the decisions you made about data, information and policy. Produce a report that
This activity covers learning aims B and C. C.M3, C.M4, BC.D2, BC.D3 |
Note: This report is provided as a sample for reference purposes only. For further guidance, detailed solutions, or personalized assignment support, please contact us directly.

BERIMBOLO SECURITY – SMART IT TRANSFORMATION REPORT
ACTIVITY 1 – Building a Future-Ready IT Infrastructure
The Situation
Berimbolo Security is no longer a small startup with one laptop—it’s evolving into a fast-growing security company. With new staff, new office space, and increasing customer demand, the business needs a smart, connected, and secure IT ecosystem.
The Digital Backbone (IT Infrastructure Plan)
1. Hardware – The Tools of the Trade
Imagine every employee equipped like a pro:
- 🖥️ Office staff → High-performance desktops
- 💼 Owners → Lightweight laptops for remote + travel
- 📱 Engineers → Tablets/smartphones for on-site work
- ☁️ Cloud servers → No more “one laptop risk”
👉 Result: Work happens anytime, anywhere.
2. Software – The Brain Behind Operations
Instead of chaos, everything becomes automated:
- 📊 Accounting software → Payroll + budgeting
- 📅 Scheduling system → Auto-assign jobs
- 🤝 CRM → Customer data in one place
- 📹 Security software → Monitor CCTV remotely
👉 Result: Faster decisions, zero confusion.
3. Connectivity – Always Connected
- ⚡ Fibre broadband in office
- 📶 5G/mobile internet for engineers
- 🔐 VPN for secure remote access
👉 Result: Real-time updates, no delays.
4. Network – The Invisible Web
- 🏢 LAN → Inside office
- ☁️ Cloud network → Remote access
- 📡 Wi-Fi → Flexible working
👉 Result: Everyone stays connected like a team.
Impact – The Good & The Risky
Positive
- Faster customer service
- Better communication
- Organized workflow
Challenges
- Setup cost 💸
- Cybersecurity risks 🔓
- Staff training needed 🎓
Final Recommendation (The Winning Setup)
✨ Move to Cloud-Based Infrastructure
✨ Use CRM + Scheduling Software
✨ Provide mobile devices to engineers
✨ Install Firewall + VPN security
👉 Why? Because it’s scalable, secure, and perfect for a growing business.
ACTIVITY 2 – Power of Data & Information
Data = Business Intelligence
Internal Data Use
- Employee records
- Job schedules
- Financial data
External Data Use
- Customer communication
- Supplier coordination
- Marketing campaigns
Why Data Matters
Data is not just information—it’s power:
- Helps in decision-making
- Tracks business growth
- Improves customer satisfaction
Tech That Handles Data
- 📂 Databases (Cloud storage)
- 🤖 CRM systems
- 📈 Analytics tools
Online Communities = Free Marketing Engine
- Instagram & Facebook → Promotions
- Google Reviews → Trust building
- Forums → Customer feedback
Data Manipulation (Smart Use)
- Sorting customer lists
- Analyzing sales trends
- Generating reports
👉 Result: Better strategies, higher profits.
ACTIVITY 3 – IT POLICY (The Rulebook)
1. Data Protection Policy
- Strong passwords 🔑
- Data encryption 🔒
- Regular backups 💾
2. Acceptable Use Policy
- No illegal downloads
- Limited personal use
- Respect company systems
3. Cybersecurity Policy
- Antivirus installed
- Firewalls active
- Regular updates
4. Legal Responsibilities
- Protect customer data
- Follow copyright laws
- Maintain privacy standards
5. Ethical Use
- No misuse of information
- Honest communication
- Respect confidentiality
Threats vs Protection
| Threat 🚨 | Solution 🛡️ |
|---|---|
| Hacking | Firewall + VPN |
| Malware | Antivirus |
| Data Loss | Backup systems |
ACTIVITY 4 – Evaluation & Justification
Alternative Options Considered
- Local servers ❌ (expensive, less flexible)
- Manual systems ❌ (slow, error-prone)
👉 Cloud-based system = Best choice ✔️
Impact of Threats
- Data breach → Loss of trust
- System failure → Business downtime
How We Reduce Risks
- Multi-factor authentication
- Staff training
- Regular backups
Impact on Stakeholders
Staff
- Easier work
- Better communication
Customers
- Faster service
- Reliable support
Business
- Growth 📈
- Efficiency ⚡
Final Justification
The chosen IT system:
- Supports business expansion
- Improves efficiency
- Keeps data secure
- Enhances customer experience
👉 In short: Berimbolo transforms from small business → smart digital enterprise
Conclusion
With the right IT infrastructure, data strategy, and policies, Berimbolo Security is not just keeping up with growth—it’s leading it.
Send Your assignment brief
Share your assignment brief and after Checking assignment requirement expert Will share the quote
Get Quote and pay
Once quote is sent, you can make Payment through secure option after which our team will start work
Get Assignment
Our team will Deliver the work you can share If any feedback

