Assignment help

Join our 150К of happy users

Get original papers written according to your instructions and save time for what matters most.

Card image cap

Unit 1: Information Technology Systems Sample Pearson BTEC Assignment Brief

Sample Pearson BTEC Set Assignment Brief

Single Part Assessment

Unit 1: Information Technology Systems

For use with

Pearson International BTEC Level qualifications in Information Technology

Certificate/Extended Certificate/Foundation Diploma/Diploma/Extended Diploma

Advised supervised hours20 hours

For completion by the centre

Qualification (select as appropriate)Certificate/Subsidiary Diploma/Foundation Diploma/Diploma/Extended Diploma
Assessment date 
Instructions to teachers/tutors and/or invigilators

The Pearson Set Assignment will be assessed internally by the centre using the unit assessment criteria given in the qualification specification. The Set Assignment will be sampled by the Standards Verifier as part of the standards verification annual centre visit.

Conditions of supervision

The Pearson Set Assignment should be carried out under supervised conditions. We advise that the Set Assignment can be in more than one supervised session.

The Set Assignment must not be shared with learners before the supervised session that will be arranged by the centre. Teachers/tutors and invigilators should note that they are responsible for maintaining security and for reporting issues to Pearson.

Outcomes for Submission

Learners must complete this set assignment on a computer, using office productivity software. Learners must save their work regularly and ensure that all materials can be identified as their work.

Learners must submit their own, independent work as detailed in the set assignment.

Instructions to learners

Read the Set Assignment information carefully.

You will be asked to carry out specific written activities, under supervised conditions, using the information provided.

You must work independently at all times and must not share your work with other learners.

You must complete ALL activities.

Set Assignment information

Berimbolo Security sells and installs security systems for homes and small businesses. The company has recently seen an increase in demand for the services it provides. To meet this demand it will employ more staff and move to new office premises. These office premises do not have any infrastructure installed.

The company currently employs two people; Royce and Rickson Berimbolo, the brothers who started the company. A further four people have been employed to start work when the company moves to the new premises. The company uses a single laptop computer for all their IT requirements.

You have been hired by Berimbolo Security as an information technology (IT) professional to help the brothers plan how they should use IT to meet the needs of their growing business.

Table 1 gives information on the expected needs of the company as it grows. The table includes details of staff, key tasks to be performed and the IT requirements of the business.

Staff information
Name and job roleTasks to perform
Royce and Rickson Berimbolo – company owners (remote working and office based)
  • Managing the company’s budget.
  • Managing the company payroll.
  • Checking and monitoring the work of all staff.
  • Communicating and negotiating with suppliers.
  • Visiting customers to:
  • discuss and analyse their security needs
  • install security systems
  • carry out maintenance on security systems.
James De Sousa and Sarah Micklethwaite – office staff (office based)
  • Organising engineers’ schedules.
  • Supporting customers by booking/rearranging appointments.
  • Calculating the costs of jobs based on engineers’ needs analysis.
  • Managing billings and payments.
  • Dealing with enquiries from current and new customers.
  • Keeping central records.
  • Advertising the company.

Carrying out public relations.

Lu Chen and Darren Williams – engineers (remote working)
  • Visiting customers to:
  • discuss security needs
  • install security systems
  • carry out maintenance on security systems.
IT requirements
  • IT access for all staff to carry out their listed tasks effectively.
  • Data storage for staff, supplier and customer records.
  • Ensure the correct supplies are available each day.
  • Create daily schedules/lists of appointments.
  • Efficient distribution of schedules to engineers (and other relevant staff).
  • Allow engineers to communicate with the office throughout the day, including:
  • requesting additional parts
  • updating progress (e.g. job running late or finished early)
  • recording and submitting the outcomes of needs analysis
  • help with finding locations of appointments.
  • Allow effective communication between all stakeholders.
  • Allow customers to make/amend appointments.
  • Allow security systems to be monitored remotely.
Additional information

Berimbolo provide options for the security systems to be installed. These include:

  • A basic intruder alarm triggered by motion sensors
  • CCTV with a choice of online or local storage media
  • online monitoring of the alarm system and CCTV footage by the customers and Berimbolo

Table 1

Set Assignment

You must complete ALL activities.

ACTIVITY 1 – suggested time 6 hours

Produce a report for Royce and Rickson Berimbolo, evaluating how IT infrastructure could be used to meet the needs of Berimbolo Security.

The report should:

  • explore ways in which software, hardware, data connections and networks can meet the needs of the company and its stakeholders
  • explore the impact of IT infrastructure on the company and its stakeholders
  • provide justified recommendations for an IT infrastructure solution for the company.

It is suggested that you use a combination of written, tabulated and diagrammatic information in your report.

This activity covers learning aim A – A.P1, A.P2, A.P3, A.M1, A.D1

ACTIVITY 2 – suggested time 6 hours

Produce a report for Royce and Rickson Berimbolo, analysing how data and information can be used to meet the needs of Berimbolo Security and its stakeholders.

The report should consider:

  • internal and external uses of data and information
  • how and why Berimbolo Security will make use of data and information (internally and externally)
  • ways in which information technology can support the use of data and information
  • ways in which online communities can support the use of data and information
  • ways in which data can be used and manipulated.

This activity covers learning aim B – B.P4, B.P5, B.M2

ACTIVITY 3 – suggested time 5 hours

Berimbolo Security requires policy documents to communicate how IT should be used in the company.

Produce policy documents for Berimbolo Security, detailing how the company’s staff should make use of IT so that they operate in a legal, moral, ethical and safe manner.

The policies should cover issues associated with Berimbolo Security’s use of IT and how these can be addressed, including:

  • defining potential threats to data, information and systems
  • exploring processes and procedures that should be put in place by the organisation to protect data
  • exploring moral and ethical issues
  • legal issues associated with the use of IT
  • relevant professional guidelines and codes of practice
  • managing infrastructure, data, information and users.

This activity covers learning aim C – C.P6, C.P7, C.P8

 

ACTIVITY 4 – suggested time 3 hours

Royce and Rickson Berimbolo have asked you to justify the recommendations you have made for their company in Activities 2 and 3.

You must evaluate the decisions you made about data, information and policy.

Produce a report that

  • considers alternative ways that data and information could have been used and communicated
  • explores the impact on the company and its stakeholders of
  • internal and external threats
  • ways of mitigating threats
  • procedures for working in a legal and ethical way
  • provides detailed and supported evaluation of the impact the use of both data and information on
  • the company
  • the company’s stakeholders
  • policies to be implemented
  • provides a supported justification of any decisions you made when developing policies.

This activity covers learning aims B and C.

C.M3, C.M4, BC.D2, BC.D3

Note: This report is provided as a sample for reference purposes only. For further guidance, detailed solutions, or personalized assignment support, please contact us directly.



BERIMBOLO SECURITY – SMART IT TRANSFORMATION REPORT

ACTIVITY 1 – Building a Future-Ready IT Infrastructure

 The Situation

Berimbolo Security is no longer a small startup with one laptop—it’s evolving into a fast-growing security company. With new staff, new office space, and increasing customer demand, the business needs a smart, connected, and secure IT ecosystem.

 The Digital Backbone (IT Infrastructure Plan)

 1. Hardware – The Tools of the Trade

Imagine every employee equipped like a pro:

  • 🖥️ Office staff → High-performance desktops
  • 💼 Owners → Lightweight laptops for remote + travel
  • 📱 Engineers → Tablets/smartphones for on-site work
  • ☁️ Cloud servers → No more “one laptop risk”

👉 Result: Work happens anytime, anywhere.

2. Software – The Brain Behind Operations

Instead of chaos, everything becomes automated:

  • 📊 Accounting software → Payroll + budgeting
  • 📅 Scheduling system → Auto-assign jobs
  • 🤝 CRM → Customer data in one place
  • 📹 Security software → Monitor CCTV remotely

👉 Result: Faster decisions, zero confusion.

3. Connectivity – Always Connected

  • ⚡ Fibre broadband in office
  • 📶 5G/mobile internet for engineers
  • 🔐 VPN for secure remote access

👉 Result: Real-time updates, no delays.

4. Network – The Invisible Web

  • 🏢 LAN → Inside office
  • ☁️ Cloud network → Remote access
  • 📡 Wi-Fi → Flexible working

👉 Result: Everyone stays connected like a team.

Impact – The Good & The Risky

Positive

  • Faster customer service
  • Better communication
  • Organized workflow

Challenges

  • Setup cost 💸
  • Cybersecurity risks 🔓
  • Staff training needed 🎓

Final Recommendation (The Winning Setup)

✨ Move to Cloud-Based Infrastructure
✨ Use CRM + Scheduling Software
✨ Provide mobile devices to engineers
✨ Install Firewall + VPN security

👉 Why? Because it’s scalable, secure, and perfect for a growing business.

ACTIVITY 2 – Power of Data & Information

Data = Business Intelligence

Internal Data Use

  • Employee records
  • Job schedules
  • Financial data

External Data Use

  • Customer communication
  • Supplier coordination
  • Marketing campaigns

 Why Data Matters

Data is not just information—it’s power:

  • Helps in decision-making
  • Tracks business growth
  • Improves customer satisfaction

Tech That Handles Data

  • 📂 Databases (Cloud storage)
  • 🤖 CRM systems
  • 📈 Analytics tools

Online Communities = Free Marketing Engine

  • Instagram & Facebook → Promotions
  • Google Reviews → Trust building
  • Forums → Customer feedback

Data Manipulation (Smart Use)

  • Sorting customer lists
  • Analyzing sales trends
  • Generating reports

👉 Result: Better strategies, higher profits.

ACTIVITY 3 – IT POLICY (The Rulebook)

1. Data Protection Policy

  • Strong passwords 🔑
  • Data encryption 🔒
  • Regular backups 💾

2. Acceptable Use Policy

  • No illegal downloads
  • Limited personal use
  • Respect company systems

3. Cybersecurity Policy

  • Antivirus installed
  • Firewalls active
  • Regular updates

4. Legal Responsibilities

  • Protect customer data
  • Follow copyright laws
  • Maintain privacy standards

5. Ethical Use

  • No misuse of information
  • Honest communication
  • Respect confidentiality

Threats vs Protection

Threat 🚨Solution 🛡️
HackingFirewall + VPN
MalwareAntivirus
Data LossBackup systems

ACTIVITY 4 – Evaluation & Justification

Alternative Options Considered

  • Local servers ❌ (expensive, less flexible)
  • Manual systems ❌ (slow, error-prone)

👉 Cloud-based system = Best choice ✔️

Impact of Threats

  • Data breach → Loss of trust
  • System failure → Business downtime

 How We Reduce Risks

  • Multi-factor authentication
  • Staff training
  • Regular backups

Impact on Stakeholders

Staff

  • Easier work
  • Better communication

 Customers

  • Faster service
  • Reliable support

Business

  • Growth 📈
  • Efficiency ⚡

Final Justification

The chosen IT system:

  • Supports business expansion
  • Improves efficiency
  • Keeps data secure
  • Enhances customer experience

👉 In short: Berimbolo transforms from small business → smart digital enterprise

Conclusion

With the right IT infrastructure, data strategy, and policies, Berimbolo Security is not just keeping up with growth—it’s leading it.

Send Your assignment brief

Share your assignment brief and after Checking assignment requirement expert Will share the quote

Get Quote and pay

Once quote is sent, you can make Payment through secure option after which our team will start work

Get Assignment

Our team will Deliver the work you can share If any feedback