Task 1- Plan for managing and supporting systems
Management and supporting infrastructure of the new office
Networking code of practice
- Do not share your password
- Do not bring your personal devices into the organization
- Do not change the background of your desktop
- Do not download stuff without permission
- Do not answer phone calls if not necessary
- Do not visit websites that are inappropriate
- Do not show any documents
- Must follow health and safety rules at all times
Support request and escalation procedures
- Step 1- Identify and Document Issues. Project manager, team members or any other stakeholders can raise issues at any time.
- Step 2 - Review issues
- Step 3 - Communication of issues
- Step 4 - Escalate the risk of an issue
- Step 5 - Update the information about issue as you work on it
A service level agreement proposal
On a network your not allowed to download stuff without permission. We considered this as a law because some files on the internet might contain different type of viruses which might harm our computer which could lead to loss of data or the computer failing and we would have to buy new one. Before downloading's any stuff you will have to ask for permission from the staff above and the file/website is going to be looked at first to see if it considers anything If it doesn't consider anything it is clear to download it.
We have not allowed our staff to bring any of their own devices into the company apart from mobile device because there are always some risks that somebody is going to bring something in and connect it with a computer and then the computer is going to get infected with some kind of virus and there would be high possibility that the data would be lost. So with that rule we are trying to avoid any type of situations like that to keep our work safe. As if we don't have time to redo our old work again.
Contingency plan
Floods
impact - If the water gets inside the devices it might make them unusable un less your quick enough and you can dry your device off and save your work. However it might not work properly which means some of the data might be lost. You should consider checking the computers around the pc that has been flooded to prevent further damage.
recovery strategies - New equipment should be ordered only parts of the pc that has been damaged to prevent big money spending. Also the contingency plan has to be edited to prevent this type of situations in the future.
plan - Inform the insurance company and make them aware of all the damaged cost from the flood.
If equipment is found test if the equipment is working.
recovery and testing - Replace the equipment that was damaged and see if the all the systems are working correctly. All work should have been backed on the OneDrive to prevent time wasting because its very important that we are ahead of other companies.
Fire
impact -There will be burned devices which will make them unusable which could lead to data lost in cyber solutions. All computer would have to be check if there was no further damage onto different computers. All the computers that have been damaged should be replaced.
recovery strategies- New equipment is going to be ordered and we will have to edit our contingency plan to be aware of the event in the future so we can avoid further damage if it happens again.
plan- Inform the insurance company and make them aware of all the damaged cost from the burned devices . If equipment is found test if the equipment is working.
recovery and testing- Replace the equipment that was damaged and see if the all the systems are working correctly. If the systems are working correctly you should save your work on OneDrive as soon as possible as if you don't wont to re-do your work again because we are going to waste our time and will be behind other companies.
Earthquakes
impact -There will be earthquake which will make them unusable which could lead to data lost in cyber solutions. Earthquake can cause a lot of damage which would cause pc's to be swapped for better ones.
recovery strategies- We will order new equipment for these computers that got damaged from the earthquake. It is important that we replace our damaged equipment as soonest as possible as we don't want to waste any time. Also we will have to edit our contingency plan to be better prepared for events like that in the future.
plan- Inform the insurance company and make them aware of all the damaged cost from the earthquake disaster devices . If equipment is found test if the equipment is working. All destroyed devices should be replaced by the new equipment.
recovery and testing- Replace the equipment that was damaged and see if the all the systems are working correctly. If the systems are not working properly it means that all of your data will be lost. Unless you have saved your work on OneDrive or different app like that.
User support document
- User manuals
- FAQ
- Step by step guides
- Online chart portals
- Embedded assistance
User desktop interface design
- iOS. Apple's revolutionized the user interface for both desktop and mobile computing.
- Windows 8 Mobile.
- Graphical user interface , A tactile UI input with a visual UI output
- Menu driven user interface A UI that uses a list of choices to navigate within a program or website. For example, ATMs us
e menu-driven UIs and are easy for anyone to use. - Touch user interface - User interface through haptics or touch. Most smartphones, tables and any device that operates using a touch screen use haptic input.
- Voice user interface - Interactions between humans and machines using auditory commands. Examples include virtual assistant devices, talk-to-text, GPS and much more.
Systems & network requirements
- Windows 7 or higher 64-bit
Apple mac OS 10.13 or newer.- Linux
- Versions for iPhone and iPad are available on the Apple app Store
- A version of Android smartphones and tablets is available on the google play store.
- Scalable Connectivity. Starting with the obvious , a network must provide connectivity among a set of computers.
Backup procedures
- Offline backups- This type of backup is perhaps the easiest to perform as it involves simply copying database and log files o an offline storage area.
- How to create offline backup:
- 1. Commit or abort all on-going transactions.
- 2. Pause all databases writes.
- 3. Force a checkpoint. See checkpoints for details.
- 4. Copy all your container files to the backup location. However, be aware that backing up just the modified databases only works if you have all of your logs files. If you have been removing log files for any reason then using can result in a unrecoverable backup because you might not be notified of a database file that was modified.
- 5. Copy the last log file to your backup location. Your log files are named log.xxxxxxxx where xxxxxxx is a sequential number. The last log file is the file with the highest number.
- Hot backups- This type of backup gives you a snapshot of your database. Since your application can be writing o the database at the time that the snapshot is being taken, you do not necessarily know what the exact state of the database is for that given snapshot.
- How to perform hot backup:
- 1. Put the data baes in begin backup mode
- 2.Copy above files using Linx cp command to backup location
- 3.Put DB in end backup mode
- 4.Take manual control file backup
- 5.Backup the archive logs generated during the begin backup and end backup mode.
- Incremental backups - This type of backup refreshes a previously performed backup.
- How to perform incremental backup:
- 1. Launch wondershare Ubackit
- 2. Select files/ folder from Hard Drive
- 3. Choose Backup Destination
- 4. Set Automatic Backup Schedule
- 5. Evoke The Backup Process
Comments
Post a Comment