The document provides instructions for an assessment of an ICT support candidate. The candidate will complete 4 projects testing their skills in connecting hardware, installing software, protecting systems, and responding to user requests. They have 2 hours and 30 minutes to complete the projects which will assess their competencies in areas like installing applications, setting up security features, and creating user accounts. The projects involve tasks like connecting devices, installing antivirus software, and prioritizing support requests from different departments.
This document provides guidance on effectively accessing information through appropriate methods, tools, and search strategies. It discusses selecting the best sources and evaluating reliability. Methods of accessing information include reading, listening, viewing, and using intuition. Tools include searching databases, the internet, and libraries. The document cautions that online information requires critical assessment for accuracy and advises using scholarly sources over general searches. It defines primary, secondary, and tertiary sources to identify different types of information.
The document summarizes a UI/UX internship at Build Formula, an IT company that provides software development and design services. Over the course of two weeks, the intern was assigned daily tasks to gain experience with tools like Figma, learn UI/UX concepts, and design pages for a website. Some challenges included getting accustomed to the new work environment and properly applying UI/UX principles. Skills developed included user experience research methods, interface design, and prototyping. Overall, the internship provided valuable lessons in collaboration, design, and gaining industry knowledge.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This is an internship presentation that I created as part of the internship curriculum, you can use this presentation for a web developer internship presentation that you might need to give in your college.
If you want some animation please see Internship Presentation 2 that I uploaded.
It has basic web developer tools explained like Git, HTML, Java etc.
Презентация "Успешное собеседование на английском"EnglishDom
Советы, которыми поделилась школа английского по скайпу EnglishDom помогут вам заполучить работу своей мечты и успешно пройти собеседование на английском!
How to write an internship report. Format of internship report. This report h...Payaamvohra1
This ppt gives you a format for writing an internship report. Do avoid some common mistakes while writing the report. Following this format will make your report more professional and captivating. It will help you to get a good CV
This document provides guidance on effectively accessing information through appropriate methods, tools, and search strategies. It discusses selecting the best sources and evaluating reliability. Methods of accessing information include reading, listening, viewing, and using intuition. Tools include searching databases, the internet, and libraries. The document cautions that online information requires critical assessment for accuracy and advises using scholarly sources over general searches. It defines primary, secondary, and tertiary sources to identify different types of information.
The document summarizes a UI/UX internship at Build Formula, an IT company that provides software development and design services. Over the course of two weeks, the intern was assigned daily tasks to gain experience with tools like Figma, learn UI/UX concepts, and design pages for a website. Some challenges included getting accustomed to the new work environment and properly applying UI/UX principles. Skills developed included user experience research methods, interface design, and prototyping. Overall, the internship provided valuable lessons in collaboration, design, and gaining industry knowledge.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
This is an internship presentation that I created as part of the internship curriculum, you can use this presentation for a web developer internship presentation that you might need to give in your college.
If you want some animation please see Internship Presentation 2 that I uploaded.
It has basic web developer tools explained like Git, HTML, Java etc.
Презентация "Успешное собеседование на английском"EnglishDom
Советы, которыми поделилась школа английского по скайпу EnglishDom помогут вам заполучить работу своей мечты и успешно пройти собеседование на английском!
How to write an internship report. Format of internship report. This report h...Payaamvohra1
This ppt gives you a format for writing an internship report. Do avoid some common mistakes while writing the report. Following this format will make your report more professional and captivating. It will help you to get a good CV
This document provides an introduction and instructions for creating brochures, flyers, and newsletters using Microsoft Publisher 2007. It explains how to start Publisher 2007, load the program interface, and access templates for different publications. The tutorial then guides the user through creating a sample flyer, including selecting a template, editing business information, formatting pages, and choosing color and font schemes. It demonstrates basic Publisher skills like adding objects, undoing actions, and previewing designs.
The document summarizes an internship report about developing a mobile application called "Your Lawyer" at Aveneur Solutions. It includes an introduction to the company and project background, objectives to automate the current lawyer system and provide better services. The report is organized into 10 chapters covering the internship experience, project management, methodology used, and conclusions.
This document provides an overview of the internet, its history, advantages, disadvantages, and requirements. It discusses how the internet began as ARPANET, a network developed by the US Department of Defense. It describes how the internet allows people to access information from any device anywhere and share emails and files. However, it notes that not all online information is accurate and personal information could be misused. The document also outlines the components needed like a computer, modem, and ISP to connect to the internet along with definitions of search engines, web browsers, and viruses. It emphasizes installing antivirus software and updating it to protect computers from viruses.
The document discusses the main components of a Windows operating system. It describes the desktop, taskbar, start menu, minimize/maximize/close buttons, My Computer icon, recycle bin, shortcuts, and multitasking capabilities. The key components include the desktop for folders and shortcuts, the taskbar for listing open apps and files, the start menu for accessing programs, and buttons for controlling windows. The recycle bin stores deleted files temporarily and shortcuts provide quick access to programs without navigating folders.
La diffembachia camila es una planta ornamental que parece inofensiva pero en realidad contiene uno de los venenos más potentes en la naturaleza. Una persona se llevó accidentalmente un trozo de tallo a la boca y sufrió una grave inflamación y dificultad para respirar, requiriendo tratamiento de emergencia. La savia de esta planta puede causar ceguera temporal al contacto con los ojos y puede matar a un bebé en menos de diez segundos o asfixiar a un adulto en menos de veinte minutos. Se recomi
This document provides guidance on performing preventative maintenance on a computer to improve performance and extend its lifespan. It recommends cleaning the external components like the monitor, keyboard, and mouse regularly, as dust can accumulate quickly. Internally, it suggests using the Disk Cleanup and Disk Defragmenter tools periodically to free up hard drive space and optimize file placement. It also stresses the importance of installing operating system and software updates, scanning for viruses regularly, and backing up files in case of hardware failure or malware infection. Regular maintenance through cleaning, optimization, and backup is presented as an effective way to care for a computer over time.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Maintaining a computer involves cleaning physical components like the keyboard, monitor, and system unit as extreme heat from dust can damage the system. It also includes regular software maintenance like virus scanning, cleaning internet caches and temporary files, scanning for malware and adware, and defragmenting the hard drive to keep the system running smoothly.
Requirements gathering and validation for mobile applicationsK Senthil Kumar
Requirements gathering and validation for mobile applications involves collecting requirements through various techniques such as brainstorming, document analysis, focus groups, interviews, observation, prototyping, requirements workshops, reverse engineering, and surveys. These requirements collection techniques are discussed in a document by K.Senthil Kumar, an assistant professor at Sri Eshwar College of Engineering, on how to gather and validate requirements for mobile applications.
The document outlines rules and guidelines for a student project report on green computing. It must be a minimum of 50 pages, follow specific formatting guidelines, and include standard report sections like an introduction, literature review, methodology, findings, discussion, and conclusion. The report must be individually or jointly researched and presented during the examination. A copy of the final report is required to sit for the exam.
An engineer effectively adapts scientific findings to benefit humanity. Engineers are trained to plan, develop, and manage projects through applying mathematics, science and technology. A modern engineer needs strong technical skills plus communication, problem-solving and management abilities to address today's complex world. Engineering involves diverse fields from civil and mechanical to newer areas like information technology and biomedical.
The document provides information about word processing including:
- Defining word processing as the creation, editing, formatting and printing of text documents using electronic word processors like Microsoft Word.
- Stating the main advantages of word processors like easy storage, editing and formatting of documents.
- Describing how to start and end a word processing program, create and save files, and close and open documents.
- Explaining how to select, copy, move, find and replace text as well as check spelling and grammar.
All data and programs are stored in a computer as Files and Folders.
Folders are containers (holders) of files.
Files and folders can appear at any level, similar to a family tree.
It has a path because you are taking exact path to find this file.
This document provides information about the Unit Converter Android application. It discusses that Android is a software stack for mobile devices that includes an operating system and applications. It also describes that an Android application runs on the Android platform, typically on a smartphone or tablet. The document outlines that the primary objective of the Unit Converter app is to allow users to convert various units, including length, temperature, currency, and weight. It was developed in Java using the Android Studio IDE. It provides descriptions of key aspects of the app, including activities, splash screens, toasts, spinners, layout files, EditText fields, and key methods like onCreate() and findViewById(). Screenshots of the app interface are also included.
The document provides an overview of the Internet and World Wide Web. It discusses that the Internet connects hundreds of thousands of networks globally through cyberspace rather than physical space. The Web consists of hyperlinked web pages in HTML format that are accessed through browsers. URLs containing IP addresses or domain names are used to locate specific web pages on servers. Search engines help users find information on the Web by topic or keywords.
Word processing refers to creating and editing documents using software like Microsoft Word, Google Docs, or OpenOffice Writer. A word processor allows users to write text, store it electronically, display it on screen, modify it using keyboard commands, and print it. Early word processors included WordStar, MacWrite, Easy Writer, and Bank Street Writer. Modern word processors offer features like editing, formatting, search/replace, spell check, and mail merge that make revising documents faster and easier than using a typewriter. Word processing is widely used for business, education, and personal applications.
This presentation discusses installing application software. It defines software as programs that enable computers to perform specific tasks, whether system software like operating systems or application software for tasks like word processing. Application software examples are provided. There are trial versions with limited functionality and time limits, as well as licensed versions that are purchased. Software compatibility refers to different programs operating satisfactorily together on the same or linked computers. The presentation provides definitions of software and different types, as well as trial versus licensed versions and compatibility.
Input output and storage devices activityshidabahri
Input devices such as keyboards, mice, and microphones are used to input data into a computer. Output devices like monitors, printers, and speakers are used to output or display the data from the computer. Input devices take information and feed it into the computer while output devices share what the computer produces. Common input devices include keyboards, mice, joysticks, digital cameras, and microphones. Common output devices are monitors, printers, speakers, and plotters.
Computer viruses are programs that spread by infecting other programs and files. They spread through infected data or programs copied from one system to another, or through email and internet files. There are different types of viruses like boot sector viruses, file infecting viruses, and program viruses. Viruses can damage systems by corrupting and deleting files, slowing performance, and erasing data. It is important to use antivirus software to scan for and remove viruses, keep backups, and avoid opening unknown files.
1. The document is an assignment front sheet for a qualification in computing and systems development. It outlines the learning outcomes and assessment criteria for a computer systems assignment.
2. The assignment requires the student to understand computer system functions, design a system to meet client needs, build and configure a computer system, and perform routine maintenance tasks.
3. For each learning outcome, the student must complete tasks demonstrating their knowledge, and provide evidence and page references in a written report. Their work will be assessed against criteria such as explaining concepts, justifying designs, and applying appropriate methods.
The document describes an information system for managing software installations and users. It discusses input and output for programs that update software records, print reports, add training classes, and change user information. It also covers network topology, backup procedures, security measures, roles in disaster recovery, and why a phased conversion is needed to install the new system given its multiple subsystems.
This document provides an introduction and instructions for creating brochures, flyers, and newsletters using Microsoft Publisher 2007. It explains how to start Publisher 2007, load the program interface, and access templates for different publications. The tutorial then guides the user through creating a sample flyer, including selecting a template, editing business information, formatting pages, and choosing color and font schemes. It demonstrates basic Publisher skills like adding objects, undoing actions, and previewing designs.
The document summarizes an internship report about developing a mobile application called "Your Lawyer" at Aveneur Solutions. It includes an introduction to the company and project background, objectives to automate the current lawyer system and provide better services. The report is organized into 10 chapters covering the internship experience, project management, methodology used, and conclusions.
This document provides an overview of the internet, its history, advantages, disadvantages, and requirements. It discusses how the internet began as ARPANET, a network developed by the US Department of Defense. It describes how the internet allows people to access information from any device anywhere and share emails and files. However, it notes that not all online information is accurate and personal information could be misused. The document also outlines the components needed like a computer, modem, and ISP to connect to the internet along with definitions of search engines, web browsers, and viruses. It emphasizes installing antivirus software and updating it to protect computers from viruses.
The document discusses the main components of a Windows operating system. It describes the desktop, taskbar, start menu, minimize/maximize/close buttons, My Computer icon, recycle bin, shortcuts, and multitasking capabilities. The key components include the desktop for folders and shortcuts, the taskbar for listing open apps and files, the start menu for accessing programs, and buttons for controlling windows. The recycle bin stores deleted files temporarily and shortcuts provide quick access to programs without navigating folders.
La diffembachia camila es una planta ornamental que parece inofensiva pero en realidad contiene uno de los venenos más potentes en la naturaleza. Una persona se llevó accidentalmente un trozo de tallo a la boca y sufrió una grave inflamación y dificultad para respirar, requiriendo tratamiento de emergencia. La savia de esta planta puede causar ceguera temporal al contacto con los ojos y puede matar a un bebé en menos de diez segundos o asfixiar a un adulto en menos de veinte minutos. Se recomi
This document provides guidance on performing preventative maintenance on a computer to improve performance and extend its lifespan. It recommends cleaning the external components like the monitor, keyboard, and mouse regularly, as dust can accumulate quickly. Internally, it suggests using the Disk Cleanup and Disk Defragmenter tools periodically to free up hard drive space and optimize file placement. It also stresses the importance of installing operating system and software updates, scanning for viruses regularly, and backing up files in case of hardware failure or malware infection. Regular maintenance through cleaning, optimization, and backup is presented as an effective way to care for a computer over time.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms for those who already suffer from conditions like anxiety and depression.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Maintaining a computer involves cleaning physical components like the keyboard, monitor, and system unit as extreme heat from dust can damage the system. It also includes regular software maintenance like virus scanning, cleaning internet caches and temporary files, scanning for malware and adware, and defragmenting the hard drive to keep the system running smoothly.
Requirements gathering and validation for mobile applicationsK Senthil Kumar
Requirements gathering and validation for mobile applications involves collecting requirements through various techniques such as brainstorming, document analysis, focus groups, interviews, observation, prototyping, requirements workshops, reverse engineering, and surveys. These requirements collection techniques are discussed in a document by K.Senthil Kumar, an assistant professor at Sri Eshwar College of Engineering, on how to gather and validate requirements for mobile applications.
The document outlines rules and guidelines for a student project report on green computing. It must be a minimum of 50 pages, follow specific formatting guidelines, and include standard report sections like an introduction, literature review, methodology, findings, discussion, and conclusion. The report must be individually or jointly researched and presented during the examination. A copy of the final report is required to sit for the exam.
An engineer effectively adapts scientific findings to benefit humanity. Engineers are trained to plan, develop, and manage projects through applying mathematics, science and technology. A modern engineer needs strong technical skills plus communication, problem-solving and management abilities to address today's complex world. Engineering involves diverse fields from civil and mechanical to newer areas like information technology and biomedical.
The document provides information about word processing including:
- Defining word processing as the creation, editing, formatting and printing of text documents using electronic word processors like Microsoft Word.
- Stating the main advantages of word processors like easy storage, editing and formatting of documents.
- Describing how to start and end a word processing program, create and save files, and close and open documents.
- Explaining how to select, copy, move, find and replace text as well as check spelling and grammar.
All data and programs are stored in a computer as Files and Folders.
Folders are containers (holders) of files.
Files and folders can appear at any level, similar to a family tree.
It has a path because you are taking exact path to find this file.
This document provides information about the Unit Converter Android application. It discusses that Android is a software stack for mobile devices that includes an operating system and applications. It also describes that an Android application runs on the Android platform, typically on a smartphone or tablet. The document outlines that the primary objective of the Unit Converter app is to allow users to convert various units, including length, temperature, currency, and weight. It was developed in Java using the Android Studio IDE. It provides descriptions of key aspects of the app, including activities, splash screens, toasts, spinners, layout files, EditText fields, and key methods like onCreate() and findViewById(). Screenshots of the app interface are also included.
The document provides an overview of the Internet and World Wide Web. It discusses that the Internet connects hundreds of thousands of networks globally through cyberspace rather than physical space. The Web consists of hyperlinked web pages in HTML format that are accessed through browsers. URLs containing IP addresses or domain names are used to locate specific web pages on servers. Search engines help users find information on the Web by topic or keywords.
Word processing refers to creating and editing documents using software like Microsoft Word, Google Docs, or OpenOffice Writer. A word processor allows users to write text, store it electronically, display it on screen, modify it using keyboard commands, and print it. Early word processors included WordStar, MacWrite, Easy Writer, and Bank Street Writer. Modern word processors offer features like editing, formatting, search/replace, spell check, and mail merge that make revising documents faster and easier than using a typewriter. Word processing is widely used for business, education, and personal applications.
This presentation discusses installing application software. It defines software as programs that enable computers to perform specific tasks, whether system software like operating systems or application software for tasks like word processing. Application software examples are provided. There are trial versions with limited functionality and time limits, as well as licensed versions that are purchased. Software compatibility refers to different programs operating satisfactorily together on the same or linked computers. The presentation provides definitions of software and different types, as well as trial versus licensed versions and compatibility.
Input output and storage devices activityshidabahri
Input devices such as keyboards, mice, and microphones are used to input data into a computer. Output devices like monitors, printers, and speakers are used to output or display the data from the computer. Input devices take information and feed it into the computer while output devices share what the computer produces. Common input devices include keyboards, mice, joysticks, digital cameras, and microphones. Common output devices are monitors, printers, speakers, and plotters.
Computer viruses are programs that spread by infecting other programs and files. They spread through infected data or programs copied from one system to another, or through email and internet files. There are different types of viruses like boot sector viruses, file infecting viruses, and program viruses. Viruses can damage systems by corrupting and deleting files, slowing performance, and erasing data. It is important to use antivirus software to scan for and remove viruses, keep backups, and avoid opening unknown files.
1. The document is an assignment front sheet for a qualification in computing and systems development. It outlines the learning outcomes and assessment criteria for a computer systems assignment.
2. The assignment requires the student to understand computer system functions, design a system to meet client needs, build and configure a computer system, and perform routine maintenance tasks.
3. For each learning outcome, the student must complete tasks demonstrating their knowledge, and provide evidence and page references in a written report. Their work will be assessed against criteria such as explaining concepts, justifying designs, and applying appropriate methods.
The document describes an information system for managing software installations and users. It discusses input and output for programs that update software records, print reports, add training classes, and change user information. It also covers network topology, backup procedures, security measures, roles in disaster recovery, and why a phased conversion is needed to install the new system given its multiple subsystems.
The document describes an information system for managing software installations and users. It discusses input and output for programs that update software records, print reports, add training classes, and change user information. It also covers network topology, backup procedures, security measures, roles in disaster recovery, and why a phased conversion is needed to install the new system given its multiple subsystems.
This document provides an overview of PC repair fundamentals, including developing a preventative maintenance plan, working inside a computer case safely, and troubleshooting issues like a failed boot. It discusses the tools and safety precautions used in PC repair work. The document also explains the boot process, how the BIOS initializes hardware and searches for an operating system, and the general steps to troubleshoot PC problems like a failed boot by interviewing the user and methodically solving issues.
The document discusses PC repair fundamentals including tools, preventative maintenance, working inside computers, the boot process, and troubleshooting failed boots. Some key points covered are essential tools for PC support technicians, developing a preventative maintenance plan, safety procedures for working inside computers, the four phases of the boot process controlled by BIOS, and a four-step process for troubleshooting PC problems.
5 assessment instrument evidence_ tos_ written t_est_etcMCabz1
1. The document outlines an evidence plan and assessment for the qualification of Computer System Servicing – NC II.
2. It details the units of competency that will be covered, including installing and configuring computer systems.
3. Evidence of skills will be collected through observation, demonstration, questioning, and portfolios.
4. The assessment includes a written test covering operating systems, installation procedures, multimedia, peripherals, and software application.
Pc assembly with_configuration_and_networkingJohndion Ruloma
This document provides information for a PC assembly and networking event including:
- The event involves assembling a PC, installing an operating system and applications, and configuring a network with two computers.
- Participants will be assessed on their workmanship, use of tools, affordability, time management, and communication skills as they complete the tasks.
- The tasks include assembling a PC, installing Windows, partitioning drives, installing applications, configuring local and network settings, troubleshooting, and maintaining computer systems.
George White has over 10 years of experience providing desktop support, help desk support, and IT engineering services. He has extensive experience with Windows operating systems, networking, Active Directory, software deployment, and troubleshooting various hardware and software issues. He is proficient in software such as Microsoft Office, Outlook, and Ghost imaging software. His background includes positions providing desktop support, imaging and deploying computers, and customer service support.
You can view the recording by clicking on the link to the right. You'll also see a link to the PowerPoint presentation and files referred to during the presentation. Please post additional questions to the Viruses & Security Forums.
Grade 8 ICT CSS Learning Plan - August 31 to September 2, 2022.docPeter Garrido
This document contains a daily lesson log for an 8th grade ICT class covering Computer System Servicing from August 31 to September 2. Over the three days, the teacher covered the following topics:
1) Discussing the relevance of the course and explaining basic concepts in Computer System Servicing.
2) Identifying and discussing the basic components of a computer like the CPU, keyboard, mouse, monitor, power supply, hard disk, USB ports, CD/DVD ROM, RAM, and motherboard.
3) Explaining the importance of Computer System Servicing and exploring opportunities in the field. Students participated in group activities to discuss computer characteristics and components.
The teacher evaluated students based
This document provides an introduction to computers, including definitions of computer hardware, software, and how programs are developed. It discusses the main components of computer systems like the CPU, memory, and input/output devices. It also defines system software like operating systems and application software. The document outlines the system development life cycle from understanding a problem to testing a program. It introduces concepts like structure charts, pseudocode, and flowcharts used in program development.
This document outlines the requirements for a software system to manage auction data for the Intellectual Disabilities Agency of the New River Valley. The system will store information on auction items, bids, bidders and finances in a Microsoft Access database with Excel import/export capabilities. Key requirements include easily inputting and accessing data, storing all necessary fields, and facilitating a faster checkout process for bidders. Non-functional requirements address security, reliability, maintainability and other attributes. Use case diagrams and sequence diagrams provide structural views of the requirements and preliminary designs are included for schedule and budget updates.
This summary provides the key details from the document in 3 sentences:
The document discusses a lesson on electronic products assembly and servicing (EPAS) for grades 7 and 8. It outlines the expected learning outcomes which include obtaining work instructions, carrying out work according to procedures, checking received materials, and replacing faulty components. The lesson materials cover topics such as assessing quality of received materials, planning and preparing for tasks, and selecting appropriate measuring instruments.
The document outlines the plans for a project to set up three new computer labs for the Corona Norco Unified School District. It includes details on team members, objectives, scope, requirements, schedules, risks, budgets, and acceptance criteria. The project aims to provide students and teachers with email, software, printing, and internet access through a secure network infrastructure.
CSS G11 Module 6 Q1 computer systems servicing for grade 12ASEJODEREK
This document provides information about installers preparation and operating system installation procedures. It discusses types of software installations like media-based, web-based, single executable files, and Windows Installer installations. It also describes portable installer software and applications that can be easily transferred between computers. Furthermore, it explains the Rufus application which is used to create bootable USB drives for installing operating systems using external devices.
B Sc IT II Sem NHSB Networking For Home And Small Business Amity UniversityKanhaiya Murarka
This file is the Lab File for the Networking For Home and Small Business Subject which is a part of the curriculum of Amity University for the course B Sc IT in the Second (II) Semseter. This file is graded for a total of 30 marks that is included in the internal assesments.
This document outlines a course project to design and deploy an enterprise IT infrastructure for a small community college. Students will complete the project in phases, first proposing their design and then implementing virtualization, Active Directory, and centralized logging. The goal is for students to reduce hardware needs through virtualization and automation while meeting the college's requirements for services like email, websites, labs, and single sign-on access. Students will be graded based on how fully they meet requirements, secure systems, automate operations, and document their work.
This document outlines a course project to design and deploy an enterprise IT infrastructure for a small community college. Students will complete the project in phases, first proposing their design and then implementing virtualization and central logging. The goal is to reduce hardware needs through virtualization and automation. Requirements include setting up a learning management system, email server, content management system, VPN, Linux and Windows labs, kiosks, single sign-on, and on-demand services. The project will be graded based on meeting requirements, security, automation, and documentation in a final report.
Case study instructions director’s request for p cs complete solutions correc...Song Love
Case Study Instructions Director’s Request for PCs complete solutions correct answers key
Find the solution at
http://www.coursemerit.com/solution-details/15234/Case-Study-Instructions-Directors-Request-for-PCs-complete-solutions-correct-answers-key
This document is a guide to set-up Mobile App security testing environment and help performing Static and Dynamic security testing. All the information provided in this document is for educational purpose only. The author is not responsible for any misuse of the information or your bricked devices.
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Physiology and chemistry of skin and pigmentation, hairs, scalp, lips and nail, Cleansing cream, Lotions, Face powders, Face packs, Lipsticks, Bath products, soaps and baby product,
Preparation and standardization of the following : Tonic, Bleaches, Dentifrices and Mouth washes & Tooth Pastes, Cosmetics for Nails.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
1. ETHIOPIAN TVET COLLEGE
Sector: ICT
Occupation: ICT support Level I
Candidate’s Package
The assessment covers the following units of competence:
1. Connect Hardware Peripherals
2. Install Software Application
3. Record Client Support Requirements
4. Protect Application or System Software
5. Maintain Equipment and Software Inventory and Documentation
6. Operate Personal Computer
7. Apply Quality Standards
8. Work with Others
9. Receive and Respond to Workplace Communication
10. Demonstrate Work Values
Candidate’s instructions and worksheets
Instructions to Candidate
Methods of Assessment
1. Observation
2. Demonstration/Observation
3. Oral Questioning/Interview
Candidate name
Registration number
Name of assessment centre
Name of training provider
Competent signature
Non competent /NYC signature
3. INSTRUCTIONS TO THE CANDIDATE
Project Information
Given the necessary equipments, tools, materials, supplies and information the
candidate is expected to perform the following FOUR projects.
Assessment place: Well equipped training center, real work site with well equipped
hardware and software tools
Total time allotted: 2:30
Occupation ICT support Level I
Units of Competence covered ALL UNIT OF COMPETENCY
1. Read this booklet carefully
2. All your questions and clarifications should be addressed to the assessor only.
3. Complete the task/project described in this booklet
4. After you finish this assessment, you are not allowed to copy anything from this
booklet or tear any page.
5. You are given fifteen (15) minutes reading time and total 3:30 hours to accomplish
the project
4. Project Title
Project 1
Task.1 Connect hardware peripheral device.
1.1 Connecting: - hared ware peripheral external port …………..
1.2 Configure your computer to use the following network resources
Note -Enable the network adapter
Configure your computer to use the following network resources
a. IP Address
b. Subnet Mask
c. Default Gateway (Router)
d. Preferred DNS
1.3 Use Browser software and the Internet configuration you configured in Question 1 to
visit the Website www.ocacc.gov.etwww.google.comwww.kat.ph
Project 2
Task.2 installs application software
2.1 Install office 2003 from the CD-ROM you are provided.
2.2 Install MS word 2007 without uninstalling the previous version.
2.3 Find and compareoffice 2007 minimum System Requirements your pc save the
Excel document in the file name System Requirements. Under desktop
Task.3 protect application or system software
3.1 Install MacAfee Antivirus and Configure the following items
3.2 Manually Scan the specific Drive and folders (D drive or any folders)
3.3 Auto Scan Schedule – Weekly every Friday and Tuesday at 10:30 PM
3.4 Configure this antivirus to update automatically daily 3AM at local time
Task: 4 protect application or system software
4.1 Set on fire wall
4.2 Set on alert automatic updates
4.3 Set on alert virus protection
Project 3
Task: 5 Prepare an Word Documents about hardware specification
5.1 Hardware specification
NO Hardware type Answer
1 System model
2 Processor speed
5. used excel the following
5.2 Prepare an word Documents about software specification
5.3 Create shortcut MS Word 2007 and MS word 2003
5.4 Create shortcut quick launch icon and Add MS word program
5.6 Crate folder under my document coc / IT Support/Exam and Hide and show
Project 4
Task:6.1 create a user account
Create a secured user account that cannot able to access any document
6.2 search wmark folder and copy to document and setting alluresfavorite
6.3 Rename WMARK by your name
6.4 show Adjust Date and Time Task bare system
6.5 customize desktop icon
Project 5
7.1 Accepts user request and prioritize these requests based on problems type and user
level agreement time
Assume that you are IT technician in the NAS food Fabric . You received the
following client request form different department this morning.
A. Atoakaludiriba from Quality control department his program installed on his
computer which used to control the food quality is not functional.
B. Atoejegugeneda from Production department his Install new media player in his
computer
3 RAM size
4 Total hard disk size/kb
5 Hard disk
Types of software Name Version
1 Os
other
2
3
6. C. W/r Meron from HR department his The candidate to develop a new human
resource management software for the company
D. W/r abeba from Production department her computer which used to monitor
factory machines is not working.
E. Atoyonas from Public relation department his required fixing her broken table for
her computer stands.
F. W/ miheret belay from HR department his Complain that one of her computer
program which used to perform daily tasks of resource management is not
functional
G. W/r Selame from Marketing Department proplem Peachtree accounting software
installer
H.
.
User level agreement
Departments Response time
Production Within 30 min
head of production Within 45 min
Marketing Within 1hour
Quality control Within 1:30 hour
7.2 Sample – Record all relevant requests using the bellow table template.
Request
Id
Request
Date
Client name Department Report problem Solved
date
7.3. Set the priority based on problems type and user level agreement.
Request priority
Department: - head of production division Date of request :- xx/xx/xx
Name of client: -mekuriberhnu Request Time:- 08:30Am
Equipment Description:- Acer Computer
Problem Description: - An abele to start and show blank screen NTLDR
7. ID
Task 8.1 Install and configure printer and print the above all documents
Interview questions
How to safety computer hard ware peripheral External port
Find and compare office 2003/2007 minimum System Requirements inside the installation
program file?
Search all file in your computer (*) all file name word, Excel and Access extension types or (
file format) ?
Howe do you do display internet Access And networking system?
Find and compare office2007 word file minimum system Requirement compare you pc
Yes& No
8. Task.1 create a user account
1.1 create a user account that cannot able to access any document
Task 2Configure your computer to use the following network resources
e. IP Address 192.168.1.[------]
f. Subnet Mask 255.255.255.0
g. Default Gateway (Router) 192.68.1.1
h. Preferred DNS 192.168.1.1
2.1 browse www. Google .com and facebook.com
Project 2 operate personal computer
Task 1 operate personal computer
1.1 show quick lunch
1.2 customize desktop icon
1.3 search wmarkfolder and copy to local c:or d:document and setting alluresfavorite
1.4 Rename WMARK by your name
1.5 Crate folder under my document IT Support and Hide and show
Project 3 Installing application software
2 Project 2 Install office 2003 from the CD-ROM you are provided.
2.1 Install office 2007 word with out uninstalling the previous version.
Find and compare office 2003 minimum System Requirements and system information
save the document in the file name System Requirements. Under desktop system
requirement
2.2create shortcut word 2003 under desktop
The following document in excel program and fill your computer Hardware and
software specification that you are using now
Project 4: Access system information
GOOD LUCK!!!
9. Hardware specification
Hardware type Brand (name of
manufacture)
Capacity or size of
the hardware
Remark
Ram
Keyboard
Hard disk
Nic
Usb ports
Monitor
Processor speed
System model
Software specification
Types of software Name Version
1 Os
2 Others Name vesion
3
4
Project 5: protecting application or system software
Install and configure antivirus and window security time allotted 30 min
Task 1: install software application
A. Install appropriate antivirus software
B. C on figure this antivirus to scan the computer weekly on Friday 3AM local
time
C. Configure this antivirus to update automatically daily 3AM at local time
Task 2: protect application or system software
7 Set on fire wall
8 Set on alert automatic updates
9 Set on alert virus protection
Task 3:
Project 5 accepts user request and prioritize these requests based on problems type and
user level agreement time
Time allotted 30 min
Assume that you are it technician in the commercial bank or Ethiopia. You received the
following client request from different department this morning.
A. Atoaddisuejigu from public relation department his computer is unable to start.
B. Atomelaku form finance department his Peachtree program is not functional when
he is trying to prepare a payroll.
10. C. W|roaberash from manager office need to listen music but her computer has the
problem on media player.
D. Wo|roabeba from human resources department her printer stop wording while
printing attendance
E. Atobelete from manager office needs paper to print his annul report.
User level agreement
Departments Response time
Manager office Within 30 min
Finance Within 45 min
Human resource Within 1hour
Public relation Within 1:30 hour
Task1. Record all relevant requests using bellow table template.
Name of client Department Problem
description
remark
Task 2. Set the priority based on problems type and user level agreement.
Task 3. Install and configure printer and print the above document.
2. Create folders in My Documents folder as follows
3. Copy the Sunset.jpg file from Sample Pictures folders in My pictures to the West Africa
Folder you created in Question 1
priority Request id
Earth
Africa Asia Europe
East Africa West Africa
Jupiter
11. 4. Path for the folder you create on Q1 (East Africa, West Africa )
AnsC:Document and setting MY document earth Africa
5. Write the Location of the file sunset.jpg found in West Africa on the space provided
below open the folder West Africa and right click on sunset.jpg then properties the
copy location
AnsC:Document and setting MY document earth AfricaWest Africa
6. Install Peachtree Complete Accounting 2005 from the CD-ROM you are provided.
7. Upgrade the Peachtree Complete Accounting 2005 Software to Peachtree Complete
Accounting 2007
8. Prepare a Word Document about Peachtree Complete Accounting 2007 minimum
SystemRequirements and save the document in the West Africa folder with file name
System Requirements.
9. Install MacAfee Antivirus and Configure the following items
a. AutoScan Schedule – Weekly every Friday and Tuesday at 10:30PM
b. AutoUpdate Schedule – Daily at 12:30 PM
10. Use MS-Word to prepare a detailed System Information document about the computer
you are working on and save the document in the Jupiterfolder by the name System
Info. The document must contain the following information about your computer.
System Information
OS Name
Processor
Total Physical RAM
Total Had Drive Size (MB)
Total Free Space on C: Drive (MB)
Total Used Space on C: Drive (MB)
Size of the My Documents Folder (KB/MB)
11. Connect a Printer and Install the appropriate Driver
12. Print the document you prepared in Question 4
13. Create the following user accounts as follows
User Name Password Privilege (Group
Membership)
Abebe cpu123@ Power User
Lema cpu@123 BackupOperator
14. Create a dialup network connection with username abcand password xyz123@
15. Configure your computer to use the following network resources
a. IP Address – Provided by your Invigilator
b. Subnet Mask – 255.255.255.0
12. c. Default Gateway (Router) – 192.168.3.1
d. Preferred DNS – 192.168.3.1
16. Use Browser software and the Internet configuration you configured in Question 11 to
visit the Face book Website – , google.com
17. Do the record and documentation on the sample sheet you have for the request
documentation
18. Demonstrate proper connection procedures between a UPS and a computer system to
the invigilator.
19. Write extension file name for excel, word , power point for both 20003 and 2007
Ans
File 2003 2007
Excel Xls xlsx
Word Doc docx
Power point Ppt pptx
If you miss your file and file name , and you know it is excel file how can you search it for
the file
Go to start =>search(window icon +F)=> All files and folder => on the search box type
*.xlsx(for excel 2007 file) or *.xlsfor excel 2003
*.docx for word 2007 or *.doc for word 2003 the click on search
* represent any file name
If the file name is letter then you will search with letter.xls for excel file .
20. Start menu to classic
Ans
Right click on strat menu => properties….
21. Oral Q description to search excel/word file on your pc
Ans
NIC speed(right click on task bar PC nw icon the status ), RAM speed( from BIOS),
HD ….., internet speed eg for the college 8MB
22. Inventory from your pc on which you are working the exam
Ans sample
Device /item Description quantity
Mouse USB(….) 1
13. Software CD Office 2003 1
Office 2007 1
Peachtree 2005 1
Peachtree 2007/2010 1
Antivirus 1
Printer HP2055 1
System unit Dell, optiplex 390, 1
Monitor LCD 15”(inch) 1
Keyboard USB input device 1
Include model , manufacturer ,serial number , name of device , quantity , Current status,
capacity and size (description), My computer =>right click =>manage=>device manager=>
mouse or NIC or anydevice right click =>properties (to get manufacturer and status)
23. Peachtree specification search from internet for HD, RAM and Processor
And VGA from the CD.
24. Mac update and scan schedule
Install, update , schedule for the scan and update on console and
if you need exclusion go for exclusion on the properties of on access scan to give tools
…….exclusion setting.
25. Turn on /off firewall automatic update(use why we on /off)
Turn on firewall helps to protect our pc from being used by unauthorized user
and to protect file and system from spam virus and un secured sw installation.
Turn on auto update helps to install update for the windows system file
applications on the system online from the internet
26. GB to MB convert my document and C: or D
1GB= 1024 MB
GB to MB eg. 5GB= 5*1024=5120MB
MB to GB eg 2048MB= 2048/1024=2GB
Convert your C: drive size to GB and MB go to system information =>component
=>storage =>drives/ disks=> take size……
Take my document size and convert to MB or GB right click on my document ……
14. 27. Monitor size in inch
Visual guess 15” (15 inch)
28. Device manager (install driver with update driver )
My computer =>right click =>manage=>device manager=> mouse or NIC or any device
right click =>Update Driver then follow the wizard
29. Interview how to create dialup
Tell requirement telephone lin , modem, modem driver, service from tele
Then step to create start => all program=> accessories => communication tools=>
network connection wizard=>……follow the wizard
30. What is the difference b/n Google search box and address bar on browser
On the address bar we use to type and open website
On search box we used to search for information by typing.
31. User account create 2 user allow and deny /Make private with using advanced security
sharing for one user.
Create 2 users and set the following
My computer or my document => TOOLS menu=> Folder option=>view=>use simple
sharing (do not select).
C: Document and setting (select the user folder you create) right click
=>properties=>security or sharing => Make private for file
32. Show user accounts you create and files you shared from (Document and setting)
Go to C: Document and setting
33. add Printer and printing documentation
start => printer and fax=> Add printer =>select port=>Hp
(manufacturer)=>Model=>next….
Finally print the documentation you created for request .
34. NIC provider and manufacturer storage size mouse and keyboard manufacturer
15. My computer =>right click =>manage=>device manager=> mouse or NIC or any device
right click =>properties
You can get manufacturer, status ( working properly)……
16. Project 1
Configure the network resources and download the software
1. Configure your computer to use the following network resources
a. IP Address – Provided by your Invigilator
b. Subnet Mask – 255.255.255.0
c. Default Gateway (Router) - 192.168.3.1
d. Preferred DNS – 192.168.3.1
2. Download to internet browser Google Chrome
Note :- Google chrome is a free web browser
3. Install the download file the Google chrome Software
4. The Google Chrome browser home page set in to Google Search engine
5. Download the DELL desktop OPtiplex 780 LAN driver software for windows 7 operating
system
6. Google Chrome browser in to bookmark et in DELL web site page
Project 2
Establish a peer to peer network
1. To create a network cable you will need a crimper that is capable of crimping a RJ 45
connector
2. Establish a network connection between the two computer with hub or switch
3. Test the computer of for both computer (ping)
4. File sharing for both computer
5. Connect a printer and install the appropriate driver
6. Test printer for both computer
17. Project 3
Assemble and disassemble
1. Assemble all the missing components of the computer system
2. Identify each and every missing component of the system
Missing component of the system
NO Missing component Function
1
2
3
4
5
6
3. Use MS-word to prepare a detailed your computer specification and save desktop with file
name computer specification
4. Print the Specification document
Project 4
Working with database
1. Crate a database by the name library
2. Design a new table under library
Table – write [Writer – Id, Writer – Name, sex, Age, Nationality]
Note – [W-001, W-002, W-003 ………….]
3. Design another table under library
Table – publication [pub-Id, pub-title, pub-Name, writer -Id]
Note – [P-001, P-002, P-003……….]
4. Writer id and publication title should not blank
5. Assign appropriate primary key and create relationship for the table
6. Create a data entry form for encoding to the data to the data base
7. Create query that accesses writer name and display all publication
8. Create a report of all writers with that pub-name and pub title
9. Print a data base report
18. COC L3
1. Prepare 3 computers
2. Install Windows Server OS for one of the three computer
3. Install Windows XP for the others
4. Install the NIC driver for each computers
5. Assign name for the computers
a. Misrak001 for server computer
b. Misrak textile for the one client
c. Misrak IT for the other client
6. Give an IP address for the computers use the IP between 10.20.0.1 – 10.20.0.10
and give the subnet mask
7. Install DC on the server computer by the name misrak.edu
8. Install DNS
9. Create two organizational unit by the name Misrak Textile and Misrak IT
10.Create two groups group 1 in Misrak textile group 2 in misrak IT and the groups
are member of organizational unit
11.Create two users in group 1 and create two users in group two
12.Access the server computer remotely from the client computers
13.Create a folder on the server computer for the group one users and they doesn’t
access the folder Saturday and Sunday
14.Create project proposal for internet café
15.Create training presentation for above server configuration
19. Task 1- Planning and Organizing Project work
Contents
1. Phases of the project
2. Activities to be performed.
3. Duration for each activity.
4. Required man power and responsible body.
1-: Phases of the project
Phase
Topic
A Analyze the existing LAN/WAN infrastructure Phase A completion time
B Prepare a proposal for the optimization / reorganization and
development of the network infrastructures.
Phase B starts after the ending
of phase A
C Making the initial deployment plan including costing,
duration and resources and outline a preliminary list of
network equipment’s essential for network establishment;
Phase C starts after the end of
Phase B or Phase A or can run
simultaneously with phase B
D Prepare a training plan for IT staff for the network
deployment and maintenance
After finishing the phase C
Phase D starts
E Network deployment stages. Phase E starts after the phase D
F Establishment of network monitoring and auditing cell and
feed back report for further improvement.
Phase F can be kept monitoring
and auditing while deployment
phase E going on by a audit
team on site
Final auditing report will be
submitted after the phase F and
before the starting of phase G
Time table six is reserved for
the fixing the problems found
in auditing.
G Documentation of the network and final handover to the
project.
This phase starts after the
phase F
2:-Activities to be performed
This is containing in project phase in topics.
Analyze the existing LAN/WAN infrastructure of the organization.
1. Analyze existing LAN and WAN infrastructure report, prepared by Information-Analytical Department of the government and
examine the government’s requirements.
2. Preparing solution for urgent temporary merging of existing LAN/WANs to meet the government’s requirements.
3. Prepare a final assessment report based on the analysis of the existing network.
Prepare a proposal for the optimization / reorganization and development of the data infrastructure:
1. Analyze the market of local communications (lines) owners/providers and
2. Propose a viable solution for communications link setup across the country.
3. Calculating the estimated cost of the network optimization / reorganization and deployment.
20. 4. Outline a preliminary list of network equipments essential for network establishment; Submitting a complete project plan to
Government for approval
Prepare training plan for IT staff for deployment and maintenance:
For IT support and Network Administrators
1. Plan a short term local training for IT specialists on network installation/support, calculate estimated cost of trainings.
2. Communicate with the Head hunting firms for the required experts and consultants.
3:-Duration for each activity
This is containing in project phase in different time tables.
First 1 day: - for surveying the project site and proposing
Second 5 days: - will be purchasing of devices and equipment’s
Third 7 days: - for Trucking
Forth 6 days: - for Cabling
Fifth 3 days: - for Crimping
Sixth 9 days: - for Configuration of client and server
4:-Required man power and Responsible body
Network technicians, Network Engineers, who assist man power for drilling the wall etc.
15 daily labors for trunk and cabling
3 IT officers for crimping and installation and configuration purpose
1 IT manager for the Management of the project and will Responsible for the technical works.
Task2.Identifying Network and Internet Infrastructure resources
Servers Brand name of
manufacture
Capacity
Database Server Dell 8GB RAM.
Application Server “ 8GB RAM.
Mail Server “ 8GB RAM.
Web server “ 8GB RAM.
1. Hardware needed to built the infrastructure
Servers
Database Server, Application Server, Mail Server, Web server, Storage Server. Servers should have above 8GB RAM.
Router
RACK
21. Distribution /multilayer switch
Access switch
Patch panel,
Module(jack),outlet and faceplate
Cables
o UTP CAT6:-User cordcable are used for connect from the user to the outlet.
o UTP CAT6:-Patch cord cable are used for connect from the patch panel to the switch.
o Fiber cable:-is used for connect from ISP to EPON.
Network toolkits
Network toolkits are crimper, pancher, cutter, Cordless, drill with number 8 and number 22.
2. Software needed to build the infrastructure
Microsoft exchange server 2010 or latest for centralized messaging system Kaspersky server based antivirus for server virus protection
Windows Server 2008, Windows 7, MS office 2010SQL server.
Type of internet connectivity needed to build the infrastructure.
Internet connectivity from telecommunication infrastrucre is EPON.
EPON abbreviated Ethernet Passive Optical Network. Since the project needed 4Mbps.
Estimate price of listed hardware, software and internet connectivity
Estimation of the necessary hardware and software and internet connection
1. Three 18 port D-link switch 5,736birr Estimation
2. One PowerEdge™ T420 tower server computer 35,000 birr
3. 500 meters of twisted pair cable will cost the company 1000birr Estimation
4. 500 meters of trunk with a size of 20×30 cm thickness 5000birr Estimation
5. 4mbps ADSL Broadband connection for the whole employee 230birr subscription fee plus 700birr
monthly charge
Task3:-Preparing Logical Design of an IT Infrastructure Solution
22. Task4:-Assisting in Policy development of client support and maintenanceThere should be a permanent
employee of It support officer who will maintain whenever the Network and hard ware failure occurs.
Phases of Project
Activities to be performed
Prepare equipment’s for infrastructure
Implantation The network
Installing the client computers
Configure the system
Test the system
23. Duration For each activates
No Tasks Month 1 Month 2 Month 3 Month 4
1 Prepare equipments
for infrastructure
2 Implantation The
network
3 Installing the client
computers
4 Configure the system
5 Test the system
For the infrastructure need man power
IT profession
Electricians
Hard Ware Requirement
List ofhardware’s for to built infrastructures
No Items Quantity Prices remark
1 Server 2 140000 birr
2 Computers 144 1152000 birr
3 Switches 11 16500 birr
4 Network Cables 3roll
5 Truncates
6 Rj 45 200
7 Crimpers 3
8 Patch panels 9
9 Punchers 3
10 Ups 146
11 Power stabilizers
12 Printers
24. Software Requirement
List ofSoftware’s for to built infrastructures
Antivirus software’s
Windows Server Operating Systems
Windows operating Systems
Microsoft exchange server software
Microsoft software’s
Browser software’s like Mozilla, Chrome
Type of internet
4MB ADSL broadband internet connection
I propose for the client support mechanism
Preventive maintenance—the prevention of equipment breakdowns before they happen.
This includes inspections, adjustments, regular service and planned shutdowns.
Repair work—repairing equipment and troubleshooting malfunctions in an effort to
return the equipment to its previous condition. These repairs may be reactive or
preventive.
25. Improvement work—searching for better materials and improved design changes to
facilitate equipment reliability. Repair work is often a part of improvement work.
Software Requirement
List of Software’s for to built infrastructures
• Antivirus software’s
• Windows Server Operating Systems
• Windows operating Systems
• Microsoft exchange server software
• Microsoft software’s
• Browser software’s like Mozilla, Chrome
Type of internet
• 4MB ADSL broadband internet connection
I propose for the client support mechanism
• Preventive maintenance—the prevention of equipment breakdowns before they happen.
This includes inspections, adjustments, regular service and planned shutdowns.
• Repair work—repairing equipment and troubleshooting malfunctions in an effort to
return the equipment to its previous condition. These repairs may be reactive or
preventive.
• Improvement work—searching for better materials and improved design changes to
facilitate equipment reliability. Repair work is often a part of improvement work.