This essay is a distinction-level work for Unit 12: Mobile Apps Development - Assignment 1 - Learning Aim b. You can efficiently work on your assignment by following my layout. in order to achieve the best grade (Distinction). All of the following criteria is met in this document: P3 - Complete at ...
thanks for your feedback, is there somehow I can help you to improve your assignment if any parts are not meeting your requirements? I have direct messaged you.
Seller
Follow
Afsar08
Reviews received
Content preview
Unit 12 – Technical Support and Management
Contents
Introduction:......................................................................................................................................2
Client requirements:..........................................................................................................................2
P3. Complete at least six routine IT support activities safely, using some appropriate processes and
behaviours:........................................................................................................................................2
Antivirus:............................................................................................................................................3
Firewall:.............................................................................................................................................3
System Update:.................................................................................................................................4
Scan Disk:...........................................................................................................................................4
Defrag:...............................................................................................................................................4
Backup:..............................................................................................................................................4
P4. Monitor the performance of the IT system safely against the client’s requirements, using some
appropriate processes and behaviours..............................................................................................5
Antivirus:............................................................................................................................................5
Before:...............................................................................................................................................5
After:..................................................................................................................................................6
Firewall:.............................................................................................................................................6
Before:...............................................................................................................................................6
After:..................................................................................................................................................7
System Update:.................................................................................................................................7
After:..................................................................................................................................................7
Before:...............................................................................................................................................8
After:..................................................................................................................................................8
Defrag:...............................................................................................................................................9
Before:...............................................................................................................................................9
Backup:............................................................................................................................................10
Before:.............................................................................................................................................10
After:................................................................................................................................................11
M2. Complete at least six routine IT support activities safely and monitor the system’s
performance to meet the client’s requirements, using appropriate processes and behaviours:....11
Antivirus:..........................................................................................................................................11
Firewall:...........................................................................................................................................12
System Update:................................................................................................................................12
Scan Disk:.........................................................................................................................................12
Defrag:.............................................................................................................................................13
, Unit 12 – Technical Support and Management
Backup:............................................................................................................................................14
D2. Complete at least six routine IT support activities safely and optimise the system’s
performance to meet the client’s requirements, using processes and behaviours effectively:.......15
Antivirus:..........................................................................................................................................15
Firewall:...........................................................................................................................................17
System Update:................................................................................................................................20
Scan disc:.........................................................................................................................................22
Defrag:.............................................................................................................................................24
Backup:............................................................................................................................................26
Unit 12 – Technical Support and Management (Part B)
Introduction:
I have been working for a PC repair company as an IT Technician. I will be carrying out 6 IT
support and management tasks, I will be monitoring the system to see how they perform,
how are the optimised and how they meet the client requirements so secure the system
with an excellent performance. I will be providing the details on a report including the
evidence to show how the optimisations are intended for the improvement of the
performance.
Client requirements:
The 7 IT support and management tasks I will be carrying out has be effectively related to
the:
User issue and fault logging
Communication with users to resolve technical issues
Support and repair tasks including work around solutions
User account management
Hardware or software installation or upgrade
Individual device configuration
Storage management
Peripheral installation and/or configuration
Software management
Disk configuration
P3. Complete at least six routine IT support activities safely, using
some appropriate processes and behaviours:
The 7 IT support activities I will be I will be completing safely, using the appropriate
processes and behaviours are:
Antivirus
Firewall
System Update
, Unit 12 – Technical Support and Management
Scan Disk
Defrag
Backup
Antivirus:
Antivirus software is meant to identify, block, and respond to dangerous software, such as
viruses, on a computer, within an IT system. Antivirus software is a vital aspect of a
comprehensive security approach, even if you operate your computer carefully to prevent
coming into touch with a virus. Antivirus software operates in the background, checking
every file opened in a computer and comparing it to known viruses and other forms of
malware in order to assist the users avoid infecting their computer. The programme also
performs system scans to guarantee that the computers are free of viruses. If the antivirus
software detects a virus or other malware signature, it will block the file from executing and
place it in quarantine, where it will either be deleted automatically, or the user may opt to
execute it if they are convinced it, is a false detection. Any company that wants to keep its
data and computer systems from getting corrupted needs antivirus protection. Antivirus
software acts as a security guard at the entrance, stopping intruders from entering. Because
prevention is much more effective than cure, having a system in place to identify and
prevent viral assaults is preferable than having to spend time and money patching affected
equipment.
Furthermore, if a virus exposes sensitive customer data or sends unwanted emails to
the contacts in an effort to spread the infection further, the organisation image might be
jeopardised.
Firewall:
A firewall is a computer hardware or software security device that may help safeguard
the network within an IT system by filtering traffic and preventing unwanted access to
confidential data on organisations computers. A firewall not only blocks unwanted traffic,
but it may also assist prevent harmful malware from infiltrating the computers. Different
degrees of protection may be provided by firewalls. The challenge is to determine how
much protection the organisation will need. A firewall serves as a kind of gatekeeper. It
monitors efforts to obtain access to the operating system of the organisation and prevents
undesired traffic or unidentified sources. A firewall is a device that functions as a barrier or
filter between computers and external networks, such as the internet. Consider a firewall to
be a traffic controller. It helps to safeguard the organisation's network and information
inside the system by regulating network traffic. This involves restricting unsolicited incoming
network traffic and authenticating access by scanning network traffic for harmful elements
such as hackers and viruses.
A firewall is normally pre-installed with the operating system and security software. It's a
good idea to have such functionalities enabled. Checking security settings to ensure they are
set to execute updates automatically is a necessity.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Afsar08. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.04. You're not tied to anything after your purchase.