Barking & Dagenham College | IT Support Guide | Unit 12 – Technical Support (Assignment 1) –P1 |
By Hayden Sharp |
Table of Contents
Introduction 3
Remote Desktop 3-5
Monitoring Tools 6-7
Third Party Software 8-10
Administrative Tools 11-12
Techniques 13
IT Technical Support (P1)
In this report shall be investigating the different tools and techniques used for technical support. This will be aimed at the help desk solutions for both system and software. I shall be discussing network monitoring tools, remote desktop/assistance, command line tools and control panel utilities.
Remote desktop assistance
This piece of software allows a user to gain access to a computer
…show more content…
Tune up offers a lot of tools to enhance the computer system. It can tell you the details on what has been optimized. It can also show the user which settings should be optimized.
Click here to start the maintenance check
How long until the automatic maintenance starts
Once the user is happy with the changes made to the computer system. They can then go into other things such as a maintenance scan which can be found on the “Maintain system” window.
Click on the 1-click maintenance to start the scan this will scan and analyze the computer system in order for it to function and perform at its best. It does this by cleaning and then defragging the computers registry, freeing up disk space by getting rid of any unwanted items, removing any shortcuts that are broken, optimizing the way the computer starts up and shuts down, before finally defragging the hard disk to create more memory space. Once the results have come back the user would be able to see what has a problem and what’s been optimized. They can view the problem by clicking “Show Details” under the result of the problem
Click here to view the problem
Results of the maintenance
Administrative Tools
Administrative tools are a more advance tool used to configure and apply setting and/or Limitations to a computer system. This can be font in the control panel via the start menu. There are many different tools to be used such as computer management, local
The iBooks Author format is only able to be read in the iBooks ecosystem, and it can only be created in the iBooks Author program on a Macintosh computer.
No Browsing History- Open browsing history settings and ensure that the delete browsing history on exit is un-checked. Also click Settings and see that the Days to keep pages in history is set at 20 days. Try browsing and see if it has helped. Run Internet Explorer in No add-ons mode. If you find that your History is being saved, then it’s probably one of the add-ons which is deleting the History every time. Try to identify the offending add-on and see if disabling it helps Your history may have got corrupted or the file may have been locked by another program. User Profile may be corrupt. http://www.thewindowsclub.com
Formal user access control procedures must be documented, implemented and kept up to date for each application and information system to ensure authorised user access and to prevent unauthorised access. They must cover all stages of the lifecycle of user access, from the initial registration of new users to the final de-registration of users who no longer require access. These must be agreed by IDI. User access rights must be reviewed at regular intervals to ensure that the appropriate rights are still allocated. System administration accounts must only be provided to users that are required to perform system administration tasks.
The accompanying directions were formed for introducing Sun Java 1.5.0_08 (otherwise known as JDK 5.0 refresh 8). This may not be the most recent variant, but rather the one we are utilizing this semester. Note: Java is as of now introduced as a feature of Mac OS X, so no further establishment is essential for these machines. Guarantee, however, that you have the correct form by writing java - rendition to the unix order provoke; the reaction ought to be something like java adaptation "1.5.0_08" A run of the mill Java establishment takes around 400 megabytes of circle space. The establishment procedure reports the correct size.
I guess what makes me worthy is my genuine kindness:p. Yes I enforce the rules but I always tend to keep in nice and friendly. But answering this question is very difficult not knowing if your worthy enough to become staff. I measure my worth from the feedback I receive from the players. When I take action and receive positive feedback, I believe I am worthy. But not having the chance to receive any feedback has stumbled me upon this application. (Meaning, I have to get accepted to prove my
I have a lot of staff experience on my role of playing this game. To start this section, I was first staff on a small prison server. This was the first server I was actually staff on. On this server I applied in the early makings of the server and achieved a Helper promotion. This server was in BETA so only staff could join, there was a major amount of people in the staff team so It got around 10 players a day. From that day I got helper I went all the way from Helper to Administrator+. Admin+ was basically the highest rank on their server other than Owner / Co-Owner. On the server I helped the owner with plugins, and the staff team. I was a staff manager there and I took my job seriously and I was staff for around 2 months. From there I unfortunately resigned as the server died out and I lost contact
Since $R_I(S_I^*) \ge T_H^*$, according to Equation (\ref{Equ: DefTi}), we have: $T_I^* = \mu_I T_H^* +(1-\mu_I) R_I(S_I^*)$. After plugging $T_I^*$ in the above inequality, it follows that:
It is compulsory for Australian year 3, 5, 7 and 9 school students to complete the National Assessment Program- Literacy and Numeracy (National Assessment Program, 2016) test. The NAPLAN test provides schools, governments, education authorities, students and the community statistics of schools and individual student’s weaknesses and strengths in specific areas of curriculum. One of the areas of curriculum that is tested is Mathematics. For this assignment we had to answer five questions from a year 9 NAPLAN test. I felt confident answering majority of the questions correctly; taking my time to logically work out each question with the aid of pen and paper when needed. I am a visual learner, so I was able to mentally solve most of the questions in my head. I rarely need to use a calculator as I have memorized many different strategies for working out mathematical questions.
Received a call from Billy, had him take his computer off the network and boot it back up. Walked Billy through confirming he did have the crypto virus. Had Billy shut his computer back off, and informed him someone would be on their way to pick up his laptop. Explained to Billy we will need to wipe and reload his computer. With Chris from or offices assistance we located the files that were encrypted. Using a script created by mark we confirmed it was only Billy’s user folder that was encrypted. We did find traces of help_decrypt in the QuickBooks folder, but the QuickBooks data was intact. Using Shadow copy I resorted Billy’s user folder back to 7:00 AM Tuesday, but his files were still encrypted. Restored back to Monday at 12:00 AM and confirmed
1. I understand that the job of an Urban Teacher is a daunting task.It requires an individual with the capability to building strong student ethics , character and achievement Teaching requires passion and a desire to impart knowledge in students from all communities.
/* Thien Vu */ /* Using Code::Blocks 13.12 */ /* Assignment 4 Program 8 */ #pragma warning (disable: 4996) #include #include #include #include #include / * Sentence sequence: article, noun, verb, preposition, article2, noun2 */ int main( void ) { const char *article[5] = {"The", "One", "A", "Some", "Any"}; const char *noun[5] = {"boy", "girl", "dog", "town", "car"}; const char *verb[5] = {"drove", "jumped", "walked", "ran", "skipped"}; const char *preposition[5] = {"to", "from", "over", "under", "on"}; const char *article2[5] = {"the", "one", "a", "some", "any"}; const char *noun2[5] = {"boy", "girl", "dog", "town", "car"}; int i = 0; srand((unsigned)time(NULL)); for( i = 0; i ); // before return to main return
Wireless Routers is a wireless local area network (WLAN) that determine the next route of the packet should travel to the destination (Rouse, 2005). It converts the internet connection that was received from phone lines into radio signals and brings convenience to the portability devices that has built-in network card to gain the radio signals to get to the Internet connection (Switcher, 2015). Table 2 refers to the comparison of three models of wireless router.
Please be advised that it has been decided that due to numerous instances of fly tipping and an attempted break in that the rear service yard gates will be locked/unlocked daily by security using a combination padlock between the times of 09.00 pm to 5.00 am. The code for the gate padlock will be ‘8605’ however this code must only be given to staff that require it such as night time delivery drivers etc. Please can all retailers make sure that whoever might be using the service yard gates out of hours are certain that they lock the gates open on the way in and lock the gates closed on the way out of the park; the gates must be locked closed at all times out of hours. The service yard gates will be included in the locking/unlocking service from Monday 23rd May 2015.
It is generally limited to a geographic area such as a writing lab, school, or building. Rarely are LAN computers more than a mile apart. In a typical LAN configuration, one computer is designated as the file server. It stores all of the software that controls the network, as well as the software that can be shared by the computers attached to the network. Computers connected to the file server are called workstations. The workstations can be less powerful than the file server, and they may have additional software on their hard drives. On many LANs, cables are used to connect the network interface cards in each computer; other LANs may be wireless.
Collecting data and analyzing employee activity to identify key performance indicators (KPIs) is used to forecast an expected array for all monitored work assignments. Organizational development requires improving what the organization knows about employee performance. The statistics helps to determine whether efficiency processes that are impacting to the workload are effective. Monitoring call average handling times (AHT) per call and customer ratings can increase both productivity and quality (Levenson, 2014, p. 23). When analyzing KPIs, organizations can use the process statistics to determine or observe processes that helps to drive exceptional customer experiences by providing guidance and feedback regarding all elements of the customer