Writing email to an it help desk because wireless internet

Assignment Help Management Information Sys
Reference no: EM133568460

Assignment:

In your initial post, imagine that you are a user writing an email to an IT help desk because your wireless internet is very slow.

  • In the email, explain what the issue is and provide some context that might help an IT professional resolve it. For example, you might state that you are having issues connecting to Wi-Fi on your computer or phone, or you are getting a 404 error when you try to access a webpage. Maybe your wireless router is blinking strangely.
  • You can describe an issue that you actually have experienced as a user in the past, or choose an issue that you think is common for many users to experience.

In response to two of your peers, answer the email as if you are an IT professional working at a help desk.

If you are having issues troubleshooting the user or system error because you do not have enough information, ask the user clarifying questions. Consider:

  • What important information do I need to know in order to troubleshoot the error?
  • Did the initial post provide me with enough information to identify the probable cause and to implement the fix?

Reference no: EM133568460

Questions Cloud

Roles of the senior security manager : Include the supporting roles of the senior security manager and/or information security auditor.
How does this apply to the digital age : How does this apply to the digital age? Do you agree with the speaker? If so, Why or why not. What are some solutions to this issue?
Create a data breach response plan : Provide an excellent description of the actions required to create and implement a data breach response plan.
Discuss the ethical considerations of online privacy : In 300 wo.rds Consider the ethical considerations of online privacy and the necessity of surveillance of cybercrime.
Writing email to an it help desk because wireless internet : In your initial post, imagine that you are a user writing an email to an IT help desk because your wireless internet is very slow.
Discuss the effects of electronic mail-cloud computing : Discuss the effects of electronic mail, cloud computing and mobile phones as Information and Communication Technology (ICTs) on social life of users.
What actions would people take from viewing this dashboard : What thresholds might be missing or could use a different way to visualize them? What actions would people take from viewing this dashboard?
What do you think should be done in order to prevent divorce : what do you think should be done in order to prevent divorce, and if divorce does occur, how should parents handle it to make it easier for children to handle?
Write what the consequences of prejudice and discrimination : write what the consequences of prejudice and discrimination are, along with a reflection on the documentary.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Draw the context data flow diagram

Look at the ThudTruckers file, and based on that description, draw the Context Data Flow Diagram. Include all external agents and say what their interaction is

  Identify the entities in the proposed system scenario

Identify some of the entities in the proposed system scenario. For each entity, identify its set of associated attributes. Specify identifiers for each entity.

  How g changes when value of dissociation constant kd changed

Consider the contribution of the negative autoregulation given by the parameter g in equation.- Study how g changes when the value of the dissociation constant Kd is changed.

  Explain why is it important for any organization

Explain why is it important for any organization to sustain a permanent digital forensics team? In digital forensics, must all investigations follow the same

  How would you apply your new knowledge

Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?

  Describe the specific types of structured-unstructured data

Describe the specific methods and tools that will be used to provide visualization of the structured and unstructured data for the organization.

  Patch management and software distribution

Patch Management/Software Distribution, Trouble Ticketing - I need to know the market status in 2007 and the growing until 2011

  Prepare a paper for the hs pojects software tools

Cover sheet with the title "Home Security Requirements Project " followed by your full name and your student id.

  What are three methods of news gathering that must be avoid

What are three methods of news gathering that must be avoided due to liability concerns and laws which restrict access?

  Disaster recovery and planning

What is Disaster recovery and planning and examples along with references) for two pages in APA format

  Discuss about the emerging trends and technologies

Many components of an e-business system may include hardware, application software, network infrastructure, and e-commerce strategies.

  Evaluate which method of the secure sdlc will best serve

Evaluate which method of the secure software development life cycle will best serve your team and explain how you plan on implementing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd