Lo 1
Lo 1
Lo 1
SUPPORT SERVICE
Level II
This learning guide is developed to provide you the necessary information regarding the following
content coverage and topics:-
Identify and confirmclientperipherals.
Document clientrequirements and peripherals.
Verify clientrequirements.
Ensure warranty and support services.
This guide will also assist you to attain the learning outcome stated in the cover page.
Specifically, upon completion of this Learning Guide, you will be able to –
Identify and confirm client peripherals in accordance with organizational standards.
Document the client requirements and peripherals in line with organizational standards
and findings are reported to the appropriate person.
Verify the client requirements with appropriate person in line with organizational
standards and reporting procedures
Ensure client support expectations are covered by vendor and support services.
Learning instruction:
*Your teacher will evaluate your output either satisfactory or unsatisfactory. Ifunsatisfactory, your
teacher shall advice you on additional work. But if satisfactoryyou can proceed to the next topic.
Information Sheet – 1 Identify and confirm client peripherals
Peripheral devices are the devices that are attached to the computer’s system unit. They can be
divided into either:
input
output
communication, or
secondary storage devices
Mouse
Scanners
Keyboard
Web Cam
Web cams are small cameras that plug into your computer which allow the user to share a moving
image of themselves with others on other computers through the Internet.
Light Pen
It is an input device that with utilize alight sensitive detector to select objects a display screen.
Microphones
Microphone is attach a computer by a cable that can transmit sounds and used to
gather sound information to the computer when the computer is a multimedia
system.
Digital camera
The digital camera takes a still photograph, stores it and then sends it as
digital inputin to computer.
Joy Stick
Joystick is popular pointing device, used mostly for playing computer games.
Bar Code
The bar code is identifies the product to the supermarket’s computer and has
a description and the latest price of the product.
The age of CRT (cathode ray tube) displays is over and LCD displays are already being replaced with LED
screens. ... While LCD monitors use CCFL (cold cathode fluorescent lamps) for backlighting, the latter use
light emits diodes. This is the prime difference between the two display technologies.
Printers (all types):- a printer is a peripheral device which makes a persistent representation of graphics or text
on paper. While most output is human-readable, bar code printers are an example of an expanded use for
printers.
Plotters: - A plotter is a printer that interprets commands from a computer to make line drawings on paper with
one or more automated pens. Unlike a regular printer, the plotter can draw continuous point-to-point lines
directly from vector graphics files or commands. ... As a rule, plotters are much more expensive than printers.
Projector: -A projector is an output device that can take images generated by a computer or Blu-ray player and
reproduce them by projection onto a screen, wall, or another surface. ... Projectors can produce either still
(slides) or moving images (videos). ... Today, most projectors use either an HDM
Speaker(s):-A loudspeaker is an electro acoustic transducer; a device which converts an electrical audio signal
into a corresponding sound.
Head Phone: -Headphones traditionally refer to a pair of small loudspeaker drivers worn on or around the head
over a user's ears. They are electro acoustic transducers, which convert an electrical signal to a corresponding
sound.
The Internet, sometimes called simply "the Net," is a worldwide system of computer networks -- a network of
networks in which users at any one computer can, if they have permission, get information from any other
computer (and sometimes talk directly to users at other computers).
Email is one of the fundamental internet technologies, a tool used by nearly every person with an
internet connection. It allows you to, at no cost; send a letter of unlimited length to one person – or
many people at once. It arrives almost instantly, and they can reply straight away. Setting up your
own email account will allow you to communicate with people you know in ways you never thought
possible
Email is the modern way to send letters – you can send a message to the other side of the world and
get a reply in minutes! Email is short for electronic mail. An email is a letter that is sent over a
computer network instead of being sent through the post. You can attach documents and photos to
emails, just like you can include a photo or a document with a letter.
Internet has been the most useful technology of the modern times which helps us not only in our daily
lives, but also our personal and professional lives developments. The internet helps us achieve this
in several different ways.
For the students and educational purposes the internet is widely used to gather information so as to
do the research or add to the knowledge of various subjects. Even the business professionals and
the professionals like doctors, access the internet to filter the necessary information for their use.
Theinternet is therefore the largest encyclopedia for everyone, inall age categories. The internet has
served to be more useful in maintaining contacts with friends and relatives who live
abroadpermanently.
1.2.1.2 Content of emails
As in the case of normal mail system, e-mail is also based upon the concept of a recipient
address. The email address provides all of the information required to get a message to the recipient
from anywhere in the world.
Consider the e-mail [email protected] the above example john is the username of the person
whowill be sending/receiving the email. Hotmail is the mail serverwhere the username john has been
registered and com is thetype of organization on the internet which is hosting the mailserver.
Downloading is the process of copying a file (such as a game or utility) from one computer to another
across the internet. When you download a game from our web site, it means you are copying it
from the author or publisher’s web server to your own computer. This allows you to install and use the
program on your own machine.
You can open an attachment from the Reading Pane or from an open message. In either case,
double-click the attachment to open it. Toopen an attachment from the message list, right-click the
message that has the attachment, click View Attachments, and then click the name of the attachment.
Windows has the reputation of the most vulnerable operating system to malware. It is on the other
hand, the most used desktop and laptop platform around the world.
You may have wondered why you always need to have an anti-virus on windows system but never on
Linux or Mac OS systems. Although antivirus software is necessary for each platform, but Windows is
most susceptible to attacks.
The goal of the dispute resolution process is to exchange and review information in order to
determine whether revision or rescission is warranted of discipline, end of employment or other
application of policy.
1.2.1.7 Communication methods and financial control mechanisms
Control techniques provide managers with the type and amount of information ... Organizational
Communication · Improving Communications ... Financial statements provide management with
information to monitor financial resources and activities. ... A budget, in reality, is both a planning tool
and a control mechanism.
Self Check 1 Written Test
Name:____________________ Date:_________________
Direction: Choose the best answer for the following question, if you have some clarifications – feel
free to ask yourteacher.
Identify and clarify user/client requirements and document these in a requirements specification file
according to organizational guidelines.
Investigate and document a solution to the requirements. Document any additional requirements
discovered in the investigation and provide advice and support on the
After analysis of the client’s requirements, you should fully document the client’s requirements and
report them to your supervisor.
This document may take the forms, but would include the following:
problems and issues that may have led to the client’s request
questions asked during your meeting with the client and their answers to those questions, as
well as a list of any essential criteria
other options or possibilities of which the client may not have been aware
Any information for the client that will help them understand what they’re getting into before you
go ahead with the job (or project).
A covering memo should be attached, stating the purpose of your report and asking the supervisor for
their acceptance of the report.
Self Check 2 Written Test
Identifying the client means obtaining certain basic information about your client and any third
party directing, instructing or who has the authority to direct or instruct your client such as a
name and address. You must obtain this information whenever you are retained to provide
legal services to a client unless an exemption applies.
Verifying the identity of a client means actually looking at an original identifying document from
an independent source to ensure that your clients and any third parties are who they say they
are. You are only required to verify the identity of your client and such third parties if you are
involved in a funds transfer activity, that is, you engage in or instruct with respect to the
payment, receipt or transfer of funds. You are not required to identify and/or verify the identity
of your client and such third parties in all situations.
Methods of verification
Verification techniques can be classified into formal or informal, and static or dynamic. Four main
verification methods are inspection, demonstration, testing, and analysis. Some of the popular
verification techniques include desk checking, inspections, walkthroughs, and reviews.
A.
Ensure client support expectation by vendor
Information Sheet – 4
warranty
1.4 Taking action to ensure client support expectation by vendor warranty and support
services
Warranties and support
Before acquiring hardware peripheral devices, it is vital to assess what kind of warranties, service and
support, prospective suppliers will provide.
Warranties
A warranty is an agreed upon term which covers a computer or computer component. Generally,
most computers have a 1 or 3 year warranty. This warranty may or may not cover the service, repair
and replacement of computer parts.
It is important to know what kind of support services are offered by the prospective supplier. There
are many questions to consider such as:
If a device requires repairs does it have to be sent back to the supplier (called ‘Return to base’)
or will they provide on-site visits?
What is the average response time if service is required?
What kinds of maintenance and repair costs could be incurred during the duration of use of the
device?
Will the device require regular servicing? If so, how many services will be necessary over a one-
year period?
Self Check4 Written Test
You’ll need:
Step 3: An email with an attachment will have a paperclip icon next to it to show that there’s
something attached to the email you’ve received. Click on the icon.
Step 4: The email will open up with the attachment shown at the bottom.
Step 5: Hover over the attachment to see the download options. In this instance, you can open the
document as a 'Google Doc' or download it to your computer. We will click the down arrow to
download it to our computer.
Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click Save.
You may see a box similar to this.
Another box will pop up asking if you want to ‘Open’, ‘Save’ or ‘Cancel’ the download. Click Save.You
may see a box similar to this:
Or this:
Step 6: Find a place to save your document and download it to your computer. Once the document
has been downloaded, you may be offered another dialogue box with further options: open the
document itself by clicking Open; or open the folder to which the document has been saved by
clicking Open folder.
Step 7: Click Back to Inbox to go back to your list of received emails. You’ll now be able to access
through your Windows folders the attachment saved on your computer.
Lap Test Practical Demonstration
1. Book
beginners-intro-email-part1
Computer Hardware_ Hardware Components and Internal PC Connection
Computer Networking & Hardware Concepts
www.wikipidia.com
www.google.com
web1.keira-h.school.nsw.edu.au/faculties/IT/