Determine the appropriate fixes by testing hypotheses

Assignment Help Basic Computer Science
Reference no: EM133214219

Scenario

As an IT support specialist at a help desk for a large company. Recently, the company created a knowledge base that IT support specialists can refer to when a user calls in with technology issues. The knowledge base has been helpful because the help desk receives many tickets and calls for what turn out to be the same issues. When IT support specialists have documents to refer to during a call or the review of a ticket, the knowledge base increases efficiencies and provides users with more consistent and higher quality support.

As an IT support specialist at the company's help desk, you are assigned to create documentation that will be added to the company's knowledge base. This document will speak to the frequent issues that users have experienced within the past 30 days. Review five tickets, two audio recordings of user calls, and a chat transcript from users who experienced technical issues. Then you will use your troubleshooting skills to assess the underlying causes of the users' reported symptoms and how they should be resolved.

Directions

Given the scenario and for the purposes of this project, using a user report that describes the IT issues that users have been experiencing and the resolution, where the resolution was found, whether the help desk had to look around for a solution, or the steps that you took to resolve the issues. Then write knowledge base document to assist other IT support specialists in troubleshooting these user issues in the future.

You first must follow the troubleshooting process, which is "a systematic approach to problem solving" (TestOut PC Pro, 2020, Section 2.6.2). Within your user report and knowledge base document, you must make it clear that you have followed each of these steps based on the issues users experience in the tickets, phone calls, and chat transcript.

1. Gather information by identifying the problems that users most commonly experience and that they call the IT help desk for, given the scenario.

2. Identify what has changed in the system that may have caused each problem.

3. Hypothesize of what you think the probable cause for each issue is, based on the information gathered in the first step. You may want to come up with several hypotheses.

4. Determine the appropriate fixes by testing your hypotheses. You will also want to account for possible ramifications that you could cause by fixing the issue based on your hypotheses.

o Given the tickets, phone calls, and chat transcript, the IT support specialist assisting those users at the time may or may not have attempted the same fix. If they did, state that they determined the appropriate fix already. If you believe that they did not identify a probable cause, explain what you would have done differently if you were the one assisting the user.

5. Explain how you would implement the fix to verify the cause of the problem if you were the IT support specialist assisting the users at the time.

o In some cases, it could be that the IT support specialist had already implemented the fix, but explain whether you would have handled it similarly or differently.

6. Describe how you would ensure satisfaction of the user after the issue has been resolved.

o In some cases, it could be that the IT support specialist demonstrated ensuring satisfaction, while they did not in other cases. In these circumstances, explain whether you would have done this in the same or a different way.

7. Document the solution within your knowledge base document. Provide how-to's or steps for common user issues, as well as any lessons learned from troubleshooting these issues that would be beneficial for other IT help desk support specialists to know.

Complete the template by replacing the bracketed text with the relevant information. Repeat these steps for each user problem.

Gather Information

[Insert text]

Identify What Has Changed

[Insert text]

Hypothesis

[Insert text]

Determine the Appropriate Fix

[Insert text]

Implement the Fix

[Insert text]

Ensure Satisfaction

[Insert text]

Document the Solution

[Insert text]

Reference no: EM133214219

Questions Cloud

What other data considerations should be considered : If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to
Pick from one of three owasp : Pick from one of your three OWASP Top 10 Presentations and record a video of you presenting it as though you were giving it to the mythical development team - s
Hiding the social security number information : 1. Open ExcelTest.xls Workbook 2. Create 3 New Worksheets called: Manage, Formula, Pivot
Review plan to consult with the team via email : Review the below scenario and answer the tasks. Peter has asked Bob to review his plan to consult with the team via email.
Determine the appropriate fixes by testing hypotheses : As an IT support specialist at a help desk for a large company. Recently, the company created a knowledge base that IT support specialists can refer to when a u
Review the organisations policies : Review your organisation's policies and procedures for completing an intake interview for clients.
Data exfiltration by cloud services : Rule 1-Apply UBA-Data Exfiltration by Cloud Services on events which are detected by the Local system
Fundamental design of a network : The discussion assignment for this week will be about the fundamental design of a network and the problems associated with requirements definition for networks.
Fundamental design of a network : The discussion assignment for this week will be about the fundamental design of a network and the problems associated with requirements definition for networks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Research model aligned within the methodological approach

Describe the methodological approach and research model aligned within the methodological approach for example, Giorgi-empirical phenomenology,

  Professional ethics

Explain how the code of ethics relates to the Christian worldview. Many of the codes of ethics were founded with Biblical principles; explain this relationship.

  Description of the new system, description its component

A full description of the new system, a description of its components, and the benefit it will provide to Riordan. A discussion of the business requirements driving the need for the system

  Requirements and restrictions of project must be identified

Kirk (2016) tells us that all requirements and restrictions of a project must be identified.

  Determining the mainframe environment

Can one make an argument to bring back the terminal/mainframe environment? disadvantages of distributed computing? around 200 words & not an essay

  Application-the strategic planning process

The volatile healthcare market demands that providers be nimble competitors with advanced, ongoing planning processes that drive growth and organizational effectiveness" (Zuckerman, 2006, p. 3). How does-or should-this perspective inform strategic ..

  What variable to include in a multiple regression

How do we choose what variable to include in a multiple regression? After some research

  Describe two IT Governance Frameworks

What is IT Governance? Describe two IT Governance Frameworks? which do you consider the top three in importance and why?

  Track auser account for a members only website

Write the Java file to define a class named Account. This class will be used to track auser account for a members only website.Think about what attributes are needed. You can use your own web accounts (like onlinegaming accounts and Facebook)

  Essential in cryptography

What are the different uses of these tools besides cryptography? How do they work?

  Level of significant used for test in decimals form

Many high scool students take the AP tests in different subject areas.In 2007,of the 211,693 students who took the calculus AB exam 102,598

  Discuss how automated cybersecurity tools

1. Prevent, Detect, and Respond to Cyber Attacks Discuss how automated cybersecurity tools can support operations personnel as they attempt to prevent, detect, and respond to cyber-attacks against a company's networks and information systems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd