ICAITS017C Maintain system integrity
System Maintenance aims to provide you with technical skills to uphold an organisation's aims and services with respect to dealing with people and processes in the information technology industry.
This group of courses assumes that you have access to a computer and the Internet and that you have previous knowledge and experience using the Internet and Windows Explorer software.
Performance criteria
1. Carry out file maintenance
o File back-ups are carried out.
o Back-ups are determined and stored according to organisational guidelines.
o Records of back-up are maintained.
2. Carry out virus scanning
o Virus protection is maintained.
o Detected viruses are reported to supervisor and are removed.
3. Follow software copyright procedures
o Software licenses are monitored.
o Illegal software is determined.
o Illegal software is reported to supervisor.
4. Record software licenses
o Licensed software is determined.
o Records of license number and location are maintained.
o Personal computers and networks are checked for illegal software.
o Illegal software is reported to supervisor.
5. Restore system backup
o Back-ups are restored.
o Restore procedure are determined according to the organisational guidelines.
o Restore is carried out under supervisor instruction.
o Restore carried out is recorded according to the organisational guidelines.
Resources needed
Standard platform
• Standard computer requirements for all IT programs
Computer requirements
To study any IT program you will require:
Computer
PC capable of running Microsoft Office. Pentium III or later is preferred.
Printer
Any A4 printer
Operating system
Windows 2000 or later version. Windows XP is preferred.
Office suite
Microsoft Office Professional 2000 or later version. MS Office 2003 Professional is preferred. (if MS Office software is only used for educational purposes, it is available at special pricing from the student computer shops of most universities. Proof of student status is required.)
Internet connection
Any dial-up or broadband account with email and newsgroup access. Broadband is preferred, especially at Certificate 4 level, where some large software files are downloaded.
The computer requirements listed above apply to all IT programs. However, particular courses sometimes have additional requirements. Refer to programs for information on courses.
OLI-supplied resources
• ITSM Learning guide
• ITSM Introduction and Assessment Book
Required text
Special software
Observer
It is the student's responsibility to locate a suitable person to act as an observer for certain assessment tasks.
Learning topics
The following list of topics appears in the contents page of the course learning materials:
• Legal and ethical obligations
• The Information Age
• When are practices legal and ethical?
• When are practices legal and ethical?
• Legal and ethical obligations
• Software programs
• Installing software applications
• Installing software in Windows
• Installing WinZip
• Installing a .zip file
• Installing Microsoft Office 97/2000
• Uninstalling a program
• Backup and restore
• Why backup?
• Backing-up files
• Restoring files
• Using backup in Windows
• Using Restore in Windows
• Viruses
• What is a virus?
• Symptoms of viral infection
• Sources of viral infections
• Using anti-virus software
• Hardware faults
• Coping with hardware faults
• Recognition of hardware faults
• Administration of hardware faults
• Cleaning and maintenance procedures
• Preventive maintenance
• Maintenance schedule
• Cleaning specific components
Assessment outline
Competency Test 1
• backup and restore data
• software viruses - indicators, detection, reporting and removal
• software licensing and copyright
• observer tasks - virus checking and backup and restore C: drive
FAQs
What sorts of things can affect system integrity?
A primary cause of disruption to system integrity are computer viruses. But apart from malicious damage, accidents and hardware failure can also disrupt system integrity.
What does backup mean? I already keep more than one copy of my important documents?
Backup can be achieved in many ways. It is important to understand the more business oriented backup using a backup utility such as Microsoft Backup, rather than just copying individual files. "Proper" backup utilities can automate backup in various ways and can make backup easier and safer.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment