What you do for first five steps of troubleshooting process

Assignment Help Computer Engineering
Reference no: EM133573020

Assignment: Milestone Guidelines

Overview

You are an IT support specialist at a help desk for a large company. Recently, the company created a knowledge base that IT support specialists can refer to when a user calls in with technology issues. The knowledge base has been helpful because the help desk receives many tickets and calls for what turn out to be the same issues. When IT support specialists have documents to refer to during a call or the review of a ticket, the knowledge base increases efficiencies and provides users with more consistent and higher quality support.

As an IT support specialist at the company's help desk, your project is to create documentation that will be added to the company's knowledge base. This document will speak to the issues that users have experienced frequently within the past 30 days. To complete this activity, review the five ticket submissions. Then you will use your troubleshooting skills to assess the underlying causes of the users' reported issues and how they should be resolved.

Prompt

Troubleshooting Process: Create a document that explains what you would do for the first five steps of the troubleshooting process to resolve the issue stated in each ticket.

A. The first step in the troubleshooting process is to gather information. Explain how you would identify the problems that users most commonly experience and call the IT help desk for, given the scenario.

1. To explain how you would identify the problems, you might want to write what questions you would ask to gather the information you need to troubleshoot successfully.

B. Since the second step of the troubleshooting process is to identify what has changed, explain how you would identify what may have changed in the system that may have caused the problems, based on the computing issue.

C. Create a hypothesis of what you think the probable causes for the issues are, based on the information gathered in the first step. You may want to come up with several hypotheses.

D. Although you are not physically going to determine the appropriate fix by testing your hypotheses, explain how you would test your hypotheses as a part of the troubleshooting process. You will also want to account for possible ramifications that you could cause by fixing the issue based on your hypotheses.

E. Explain how you would implement the fix to verify the cause of the problem if you were the IT support specialist assisting users at the time.

1. In some cases, it could be that the IT support specialist had already implemented the fix; explain if you would have handled it similarly or differently.

Reference no: EM133573020

Questions Cloud

Which decision-making strategy is this group using : After a heated discussion, the policy is implemented because more than half of group's members support it. Which decision-making strategy is this group using?
Why did the radicals in congress refuse to pursue women : Why did the radicals in Congress refuse to pursue women's suffrage in addition to black suffrage in the years immediately following the Civil War?
Pervasive cultural themes shaped : Pervasive cultural themes shaped by the Enlightenment. Olson delineates three aspects on which Enlightenment thought focused. Explain those three points
Discuss about the different formations of businesses : Use the link above to research your selected type (form) Describe what you learn about it through your research in paragraph.
What you do for first five steps of troubleshooting process : IT 202- Create a document that explains what you would do for the first five steps of the troubleshooting process to resolve the issue stated in each ticket.
Whom were the cities of refuge to be a protection : whom were the cities of refuge to be a protection? Group of answer choices one who had broken one of the Ten Commandments one who had disobeyed the priests
Who was the ballerina balanchine was obsessed : Who was the ballerina Balanchine was obsessed with that the other dancers tried to look and be like? Group of answer choices Suzanne Farrell Gelsey Kirkland
Identify hardware and software solutions to meet the needs : IT 212- Identify hardware and software solutions to meet the needs of the new office location. Be sure to explain your reasoning.
What do the ages of the hawaiian islands tell us : What do the ages of the Hawaiian Islands tell us about the movement of the Pacific Plate? Group of answer choices The ages show that the Hawaiian Islands

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd