Design a job description for the help desk operators

Assignment Help Computer Networking
Reference no: EM131512690

Section Report

Read the case study and develop your IT support strategy.

Aotearoa Technology College is planning on opening campuses in Auckland, Hamilton, Wellington, and Christchurch next year. ATC hopes to have 1,000 students studying their computer courses. Of these 400 will be in Auckland and 200 in each of the other centres. The college has already signed an agreement with a computer manufacturer to lease computer equipment including computers, printers and other peripherals. This agreement includes the maintenance of the leased equipment. However the college will need to purchase its own servers and networks and maintain these itself. ATC hopes to hire a director for the IT Support Centre with several team leaders. The help desk teams will include students who will work at the centre while they are studying.

Your manager has asked you to write an IT support strategy that will support ATC equipment and its software, staff and students.

In particular, you need to investigate and make a recommendation in these four sections.

1. Design a job description for the Help desk operators.

2. Develop a code of ethics that they will need to abide by.

3. Recommend what software they need to purchase to manage the incident management process

4. Design the physical layout of the Support Centre keeping in mind that the centre needs to offer support to each campus.

Section Presentation

Each section should include a discussion of at least two alternatives looking at the advantages and disadvantages of each point. Your final recommendation needs to be supported by your discussion and may be an amalgamation of alternatives. Each section should be at least two pages long.

You need to present your IT support strategy as a report with an introduction, discussions and recommendations and a reference list.

Verified Expert

Reference no: EM131512690

Questions Cloud

What is the purpose of wsdl : What is the purpose of WSDL? How does WSDL achieve its objective?
Explain the legal regulations related to marketing : Explain the Legal regulations related to marketing, Impact of key question in accounting on the stakeholders and Legal regulation(s) related to accounting.
Strategy for securing e-business systems : Describe the just-in-time (JIT) strategy for securing e-business systems. What two reasons drove this strategy to emergence?
Candidates for a ciso staff position : Hide Description More and more hiring actions start with a written essay from job candidates followed by a telephone "screening" interview.
Design a job description for the help desk operators : Design a job description for the Help desk operators and develop a code of ethics that they will need to abide by.
Examine the exchange rate of the us dollar : Select one MNC that does not currently do business in China. Examine the exchange rate of the U.S. dollar and the Chinese Yuan for the last 24 months.
Number in the corresponding acknowledgment : What is the sqeuence number in the corresponding acknowledgment sent by the server if using:
Associated iterators using a binary search tree : Write an implementation of the set class, with associated iterators using a binary search tree.
Write business memo to your boss : Write business memo to your boss (Instructor) explaining what INFRAGuard is, when the local chapter is meeting next and what is the process to join.

Reviews

inf1512690

6/21/2017 4:43:11 AM

Completely astonishing, and extremely kind. You guys truly sets aside opportunity to comprehend the work, and fit its necessities. Excellent work delivered well in advance, will keep in mind for future assignments

len1512690

5/31/2017 1:53:26 PM

Students who, due to circumstances beyond their control, miss the assignment deadline or consider their performance in the assignment to have been adversely affected, should complete the form available from Student Central. When requesting an SAC for an assignment, you need to submit the SAC application form, external documentary evidence of the reason for the SAC, and the parts of the assignments that are completed to date. For example, if the Doctor's Certificate is for two days, the maximum extension will be two days. (Refer to the student Handbook for more detail)

len1512690

5/31/2017 1:53:20 PM

Your assignment must be submitted electronicallyprior to 8:30 a.m. on the due date, to the “Assignment Two Files” link on the Moodle Help Desk site. A hard-copy is also required, and this must be delivered to your lecturer at the next class. Assignments which are submitted after the due date and time without having received an extension through Special Assessment Circumstances (SAC) will be penalised according to the following:- • 10% of final marks deducted if submitted within 24hrs of the deadline. • 20% of final marks deducted if submitted after 24hrs and up to 48hrs of the deadline. • 30% of final marks deducted if submitted after 48hrs and up to 72hrs of the deadline. • No grade will be awarded if submitted later than 72hrs after the deadline.

len1512690

5/31/2017 1:53:10 PM

Students themselves can be an excellent resource to assist the learning of fellow students, but there are issues that arise in assessments that relate to the type and amount of assistance given by students to other students. It is important to recognise what types of assistance are beneficial to another’s learning and also what types of assistance are unacceptable in an assessment. Beneficial Assistance • Study Groups (highly recommended). Your team can share the research. • Discussion (can have class discussions if requested) • Sharing Reading Material Unacceptable Assistance • Working together on one copy of the assessment and submitting it as your own work. • Giving another student your work. • Copying someone else’s work. This includes work done by someone not on the course. • Changing or correcting another student’s work. • Copying from books, Internet, etc., and submitting it as your own work.

len1512690

5/31/2017 1:51:19 PM

You need to present your IT support strategy as a report with an introduction, discussions and recommendations and a reference list. Each section will be marked about of 12 with a further 12 marks for report layout making a total of 60 marks. Submission Your submission needs to be a well set out report. (Check “Writing a report” from the Professional Skills class). Upload the report to the moodle link in assignment 1 “Upload your IT support strategy report here”. Remember to reference correctly. Check the library website if unsure. Your submission will be checked by turnitin.com. Your lecturer may use an oral examination to ensure you understand the material submitted.

Write a Review

Computer Networking Questions & Answers

  Assignment on social media and networking presentation

Social Media and Networking Presentation, Imagine that you have been hired as a consultant for a university that wants to leverage social media and networking technologies to encourage the collaboration of students, and improve their overall sense ..

  Explain graphic files were transmitted by a e-mail

Several graphic files were transmitted by a e-mail from the unknown source to suspect in the ongoing investigation. Lead investigator provides you these graphics files and tells you that at least four messages must  be embedded in them.

  Explain the differences between the database administrator

write a 200- to 300-word short-answer response for the followingdescribe the differences between a database

  Discuss why packet switched networks are used

Discuss why packet switched networks are used for data communication instead of circuit switched - Design the sub blocks and give the slash notation for each sub block.

  What is desktop management and why is it important

What is desktop management and why is it important? What is performance and fault management? What does a help desk do? What do trouble tickets report?

  What is value in the identification field and the ttl field

What is the value in the Identification field and the TTL field - How many fragments were created from the original datagram?

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  Performance of a wimax network

The performance of a WiMax network appears to be lower than expected and you suspect interference to be the cause. Write a 2 page letter to the FCC that requesting an investigation. The letter should include explanations of the following: Test res..

  Starting and ending security and integrity levels of object

In Lipner's model consider moving the program from development into production. Write down the starting and ending security and integrity levels of this object.

  Describe the open systems interconnection protocol model

Describe the Open Systems Interconnection (OSI) protocol model and Identify major protocols for circuit switching and packet switching

  Interfaces except loopback

Run ifconfig. For all configured interfaces except loopback, there should be an "stet" address, a "HWaddr" (hardware) address, and perhaps even an "inet6" address. Each of these addresses identifies the computer within a certain context. In what cont..

  Provide a detailed network design proposal

Provide a detailed network design proposal. Your task is to design the network for this new building. The network has been assigned the 10.13.0.0/16 network address for all computers and devices.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd