• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Explain the different techniques of gathering information to answer an IT Technical problem or request. Remember all computers at Cranks Ltd are networked together and they do not have any standalone computers.

Extracts from this document...

Introduction

Unit 28 - IT Technical Support Assignment 1 - Cranks Technical Resources Scenario Cranks Ltd is a medium size IT Company based in central London. The company sells computer hardware to a number of businesses in the London area. It is very successful and has a well established staff with very little turnover. They have a well established customer list of companies in London. To give the best service to these companies they place a lot of value on good IT Technical Support for their own staff. All the computers are networked together. The company have a strong culture of very good IT Technical Support and spend considerable time and money training the staff in this department and providing them with money in order that they give very good IT support. You are working for the IT Technical Support for Cranks. As you are considered to have a great deal of IT Technical Support experience you have been asked to produce reports for the Senior Management. Task 1 (P3) Explain information gathering techniques that can be used to answer a problem or request. a) Explain the different techniques of gathering information to answer an IT Technical problem or request. Remember all computers at Cranks Ltd are networked together and they do not have any standalone computers. * How can the IT Technical Support gather information to answer a problem? This is not a description of the source of information but how that information would be obtained. (e.g. Manufacturers manuals should be catalogued in the IT Technical Support area for easy access to them). There are many different ways the IT technical Support could gather information to answer a problem. The sources would consist of manufacturer's manual and product specification, fault logs, FAQ, Internet forums, Colleagues with specialist knowledge. In order for the IT Technical Support to gather information from a manufacturer's manual and a product specification they would have to go through the catalogued manuals that are located in the IT technical support area. ...read more.

Middle

The work pressure of the company would be able to tell whether the staffs are capable of performing the task as in if they can handle it. If they cannot then they would not be needed especially if they work for a company like Microsoft where all the policies and procedures are at a high standard. Overall it would mean that a large company would have a restricted time limit and a charity would have a longer amount of time. This would mean that the IT Technical Support would have to meet the deadlines. User IT expertise This would vary because at Microsoft the user IT expertise would be at a very high standard because they are trained to be very computer literate especially with the training that the company has therefore would depend on the training. For example a charity would not be that focused on the user IT expertise. It would depend if the user is well ne through the right educated meaning that they should have gone through the right procedures which would be linked to the amount of knowledge they have in order to work in a big company. This is needed so that the IT Technical Support knows what they are doing. Other factors Other factors would include Security as in which type of antivirus that the company would use, this would be mainly because of malicious threats also to prevent certain faults. A big company like Microsoft would use an antivirus that cannot be penetrated. A charity may use a normal one such as Norton or one that is better. Fire walls are used in order to stop fraud. Another factor would include the confidentiality; this would consist of the privacy of files that would be restricted to certain staff. The confidentiality would mean the client's files as in their history, Address, Phone number, Date of Birth, account number, Age ECT. ...read more.

Conclusion

The company would become very efficient meaning that it would be on task. The business would be able to save on expenses such as certain equipment, software and maintenance. Outsourcing the business would lead to an increase in quality which would mean that the reputation would increase which then makes the company money and perhaps even a bit of profit from the work produced. Another advantage would be that if outsourced abroad to somewhere like India, there would be a time zone difference as in night there and day here this would mean that the work would be done with much efficiency. lastly you would be handing most of the responsibility to the outsourced Disadvantages: There are many disadvantages towards outsourcing IT technical support for Cranks Ltd Organisation. One of them would be that there would be hidden costs which would mean that it would be expensive because you would be signing a contract and if abroad there would be more complications towards the cost. At times things could go wrong as in you would have to do a lot of research before outsourcing, this would mean choosing a good partner so that there are no complications as in deliveries and other factors. One of the major disadvantages of this would be that once the business has outsourced the confidential data would be in risk of exposure. Once the company has outsourced the employees are at risk of losing their jobs. The quality of the company might not be as it was because of the change and perhaps the way it will be managed and organised would be different. An outsourced company would perhaps lead away from customer focus this is because you will be more focused on the needs of other things. There may be a communication barrier. Lastly you will not have any control over the management. Lastly the vendor may be contracted to a multiple amount of other businesses therefore be more interested in the others. BIBLIOGRAPGHY http://jobs.lovetoknow.com/Pros_and_Cons_of_Outsourcing http://www.flatworldsolutions.com/articles/advantages-disadvantages-outsourcing.php http://ezinearticles.com/?The-Advantages-and-Disadvantages-of-Outsourcing&id=1401755 http://www.ipmaxx.com/article.aspx?id=203958 http://cathlawson.com/2008/02/26/the-pros-and-cons-of-outsourcing/ http://www.bizhelp24.com/small-business-portal/advantages-and-disadvantages-of-small-business-outsourcing-3.html ?? ?? ?? ?? BTEC National Diploma For ICT Practitioners 5 of 13 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. The impact of the availability of electric information on individuals and society

    network or in other words, the internet therefore citizens can't access news from the world and don't know anything about the world except what government what them to know. I think it's bad because people no matter where people live or who they are have should have rights to access reliable information and news from all over the world.

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    > The beneficiary will receive two times the employees' annual base salary. 401 K PLAN > All employees are eligible for this plan > MSI does not make any contributions to this plan > Employee can contribute up to 25% to a maximum of USD 10,000 per calendar year.

  1. Hardware and software ICT revision notes

    These help you and others to understand (or remember) the purpose of small parts of the program. You will learn to use comments to explain your programs at each stage. Macro Programs Programs that are used to automate actions in applications software are called macros.

  2. System I designed in order to produce a promotion package for her newly formed ...

    I rejected my second data file because if the user used AND, OR or LIKE I their search, there would be a big list say if the user chose to search by Walsall or Tottenham so it would take longer for the user to access a specific customers data.

  1. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    Hull is a competent Access user who does not have the available free time to produce a fully functioning system. His competency with Access means that the system can be quite sophisticated and I wont have to spend as much time making the system user friendly as he will be able to navigate Access with ease.

  2. Programming Techniques

    They used to be called sub-routines. The common module types are procedures, functions and objects. Note: Pascal is used as the sample language in the examples; other languages have similar statements Variables Data handled by a program is stored in named sections of memory called variables.

  1. The purpose of this coursework is to design a network for a small to ...

    Btek IT solutions is also a company that is likely to expand in the future this will also need t be taken into consideration when planning the LAN. . Fig 1 shows the network design I plan to implement. Fig 1.

  2. Growth and Influence of Computers and Computing

    VisiCalc was the first ever spreadsheet software. It was very basic but it played the vital role in transforming computers from being handy to enthusiasts to a real weapon to in the business sector. This revolutionized the way computers were looked at and the way they were acknowledged of.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work