ICT411 Principles of ICT Infrastructure Assignment

Assignment Help Software Engineering
Reference no: EM133153955

ICT411 Principles of ICT Infrastructure - New Zealand Certificate in Information Technology

Course aim
To introduce students to the underlying infrastructure of computer technology and how it interacts to form a cohesive framework. Students will be introduced to the hardware, software and operating systems as well as the basic principles of networking.

Purpose
Learners will gain an understanding of selecting computer hardware, software, installing and configuration of computer operating system and applications,

Learning Outcome 1: Apply knowledge of single-user and multi-user computer operating systems to select, install configure and secure single-user and multi-user computer operating systems and a variety of common application software and device drivers to meet organisational requirements.

Learning Outcome 2: Use end-user security and basic performance optimisation techniques to ensure safe and efficient access to external internet sites and local and remote storage.

Learning Outcome 3: Demonstrate knowledge of the features and use of computer components and peripherals including PC assembly and disassembly.

1 Apply essential knowledge and concepts of computer hardware, operating systems, applications, and networks to provide support for hardware and software resources and a foundation for the IT Profession.
6 Apply appropriate professional, ethical and legal principles and practices to comply with legal and organisational requirements and provide a foundation for the IT Profession
7 Communicate clearly and professionally to maintain relationships and achieve objectives in a range of contexts within the IT industry.

Assessment - Scenario

Fruit & Veg Ltd Company are looking to install a Point-of-Sale (POS) system in a computer system to capture the daily sales transaction at one of their stores in Glenfield. They had previously contracted a technician to provide a computer to them. The contractor has since had an accident and is not capable of completing the task. As such you have been asked to complete the tasks of selecting the required hardware components and assembly and installation of the computer system.

They also require the operating system and the Point-of-Sales application to be installed. You will have to perform some research to select the appropriate software.

Also required, staff members need to have their own user login for both the computer and POS application. There are 5 staff members who will be using the system, Grace, Angela, Simon, Terrance, and Felix (the manager).

The computer is required to be connected to the local peer-to-peer network and access the shared folder, All_Staff.

They have a shared network printer which can be used for printing reports.

For this to be accomplished, the owner has asked you to do the following tasks:

• build the computer from the purchased hardware components;
• install the operating system, the point of sales software and anti-virus software; onto the computer, using the installation software provided;
• configure the computer operating system and POS software's security setting to meet the owner's requirements;
• connect to the stores local area network;
• give access to shared folder on network
• install the network printer for the purpose of printing documents;
• do a thorough check after installation of the machine and software to ensure that it is
meeting the store owner's requirements and can be used in the store; and
• take screenshots to verify that the installation & configuration tasks have been completed.

Based on the scenario above perform the following tasks.

Task 1: Planning and review
LO 2: Apply knowledge of single-user and multi-user computer operating systems to select, install configure and secure single-user and multi-user computer operating systems and a variety of common application software and device drivers to meet organisational requirements.

1. Develop a thorough plan for all the above tasks, your plan should include:
• review procedures, testing requirements and user acceptance document.
2. Recommend the hardware needed to build a computer to meet the user's requirements.
3. Select and recommend the appropriate software, e.g. operating system and Point of Sale.
4. Outline an installation procedure for system software and application software.
5. Produce a review that ensures that all hardware components are compatible and will meet the user's requirements.

Task 2: Assemble the computer
LO 4: Demonstrate knowledge of the features and use of computer components and peripherals including PC assembly and disassembly.

1. Build the computer.
2. Test that the computer boots and there is no POST (power-on self-test) errors.

Task 3: Install software and configure system
LO 2: Apply knowledge of single-user and multi-user computer operating systems to select, install configure and secure single-user and multi-user computer operating systems and a variety of common application software and device drivers to meet organisational requirements.

LO 3: Use end-user security and basic performance optimisation techniques to ensure safe and efficient access to external internet sites and local and remote storage.

In this task you are required to take screen shots showing each of the following as evidence.
1. Install and configure the operating system software.
2. Create user accounts for the different users, Felix requires to have administrative access to the computer.
3. Install and configure the application software.
4. Install and configure anti-virus software to perform a complete system scan each evening at 9:00pm.
5. Connect computer to company network.
6. Connect computer to shared printer.
7. Connect to shared folder on network.

Task 4: Test and evaluate
LO 4: Demonstrate knowledge of the features and use of computer components and peripherals including PC assembly and disassembly.

1. Test and evaluate the computer using the review procedure developed in task 1, to make sure the computer is ready to be used by the end user.

Task 5: Practical demonstration

LO 4: Demonstrate knowledge of the features and use of computer components and peripherals including PC assembly and disassembly.

1. Demonstrate to the end user that the computer functions as per requirements.
2. Tutor to sign off the user acceptance document.

Attachment:- Principles of ICT Infrastructure.rar

Reference no: EM133153955

Questions Cloud

Explain the benefits of effective regular communication : Explain the benefits of effective regular communication with customers and describe at least two ways how you can achieve this. Support your answer with at leas
What are the negative effects of a culture : What are the negative effects of a culture that encourages dishonesty and corruption on an organization's reputation and its employees?
Option for the speculator : The highest net profit possible on the option for the speculator based on the information above.
What is the ethical dilemma or dilemmas posed : What is the ethical dilemma or dilemmas posed in this case study? Essentially, what is the topic at hand in the case and what are the potential opposing viewpo
ICT411 Principles of ICT Infrastructure Assignment : ICT411 Principles of ICT Infrastructure Assignment Help and Solution, New Zealand Certificate in Information Technology - Assessment Writing Service
What are three reasons that john mccall provides to support : What are three reasons that John McCall provides to support his claim that employees should have strong participation rights in the companies they work for?
Establish a business : Bachelor of Business Administration has a lot of experience in woodworking. 1st option is to go out on his own and establish a business.
Find the effectiveness of a nurse : You have been asked to present a speech to your hospital board on behalf of your fellow nurses. You are to persuade the board to on the necessary needs that are
Tools and techniques for quantitative risk analysis : Explain each tools and techniques for Quantitative Risk Analysis. Elaborate how these tools & techniques would be applied to any project.

Reviews

Write a Review

Software Engineering Questions & Answers

  Flight reservation system

COP 4184 - Your application will be built from software components, a graphical user interface, XML files, XSLT documents, and (eventually) Web services. Because most applications run on multiple platforms, you will design classes and methods in a..

  Research the web to recognize a systemssoftware development

research the web to identify a systemssoftware development lifecycle. in a report format discuss selected sdlc by

  What does a curved message call line do

Describe sequence diagrams. Include in your discussion how to read them. What does a curved message call line do

  Compute the average time a student spend in the waiting line

Compute the average time a student spends in waiting line. Students have complained to the registrar about length of time they must wait to have their schedule.

  You have been hired as the cio of a large multinational

you have been hired as the cio of a large multinational internet advertising company. the president of the company is

  Construct test case for the use case scenario

Draw the graph (Do not use a generation tool. Draw it yourself and scan in or use power point tool or similar one) and does the given set of test paths satisfy Edge-Pair Coverage? If not, identify what edge(s) are missing

  Program that calculates and displays the amount of money

Create the logic for a program that calculates and displays the amount of money you would have if you invested $5000 at 2 percent simple interest for one year. Create a separate method to do the calculation and return the result to be displayed.

  Develop a list of uses cases and a use case diagram

When a purchase is made, Pizza'sR'Us.com sends an e-mail notice to the customer with the order choice as well as payment information. It also notifies the store of the oreder. The system maintains an open order until it receives notice that the pi..

  Analyze most commonly overlooked software development risks

Analyze the most commonly overlooked software development risks within an organization you work for, or with which you are familiar. In your analysis, explain what these risks are and how they affect, or can affect, a software project.

  The abafm first letter of all group members names

the abafm first letter of all group members names landscaping corporation is located at 1 park place drive markham

  What protocol game programmers would use udp or tcp

What protocol do you think video game programmers would use UDP or TCP. Why do you think the game uses one or the other protocols

  Describe the seven step sdlc model

Describe the 7 Step SDLC - 2 pages, Describe a different SDLC Model (4 step or 12 step) - 2 pages, Compare and contrast the 7 Step Model and the second model you selected (4 step or 12 step) - 1 page.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd