0% found this document useful (0 votes)
8 views7 pages

Abdelrahman Hanafy Mohomed 2b Task 2

Uploaded by

abdosnow22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views7 pages

Abdelrahman Hanafy Mohomed 2b Task 2

Uploaded by

abdosnow22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

IT Support and Management Report

Name : abdelrahman hanafy mohomed el-tayeb

Class : 3/b

introduction
As an IT technician, I am involved in handling various technical issues that develop in the
computers of the users. I intend to handle the issues effectively and have the systems up
and running. I am going to review six tasks that I have done, the improvement in systems'
performance, and behaviors that helped me do a good job in this assignment.

1-Create an Issue as User

Description: The customer said printer would not work. I was able to get this into our
system, placing the ticket at medium priority because it was non-critical.

- Proof :

- Why it matters: Logging of problems reveals problems, and it is in this regard that I am
able to treat them on the basis of their priority.
Task 2: Helping the customer who has a sluggish computer

-Description: Customer's computer was slow, asked him to restart the computer and close
the programs so that it can free the memory.

- proof :

- Why it matters: Because by closing unused programs, the computer started running
faster, and it became easier for the end user to work.
Task 3: Resetting a User's Password

Description: The customer forgot his password, so I had to reset it and reconnect him to
his account.

- Proof:

- Why it matters: resetting their passwords will enable them to enter their accounts again
without further delay and securely.
Task 4: Software Update Security

Description: updated our computers with the latest antivirus update so that the virus does
not affect them.

- proof:

Why it matters: Antivirus updates protect against viruses and help to protect our data.
Task 5 : Configuring a New Laptop

Description: Installation of all software on a new team member's laptop and connect the
same to the business network.

- Evidence:

- Why it matters: It makes new devices ready to use right out of the box.

Lab 6: File Management and Backup

- Description: Systemized records on the central server, after which the development of
automated backups was done for the safety of crucial data.

- Proof:
Why it matters: Regular backups help to avoid the losing of data, and data retrieval might
be a bit easier.

Optimize Systems.

After those, we did a couple of adjustments that fine-tuned the performance of the system:

1. Security Updates: Improved settings in the firewall and virus scanner have considerably
improved security.

- Impact: High Security, less chance of getting Viruses, much safer data.

2. High-Speed Hardware: added more RAM to an older computer to improve its speed.

Effects: This amount of increased RAM will make the overall system smooth and lag-free
when opening a lot of programs.

Good Working Habits


Time Management: I had scheduled the activities in such a manner that all were
completed with due efficiency.

- Communication: listened to the problems of users, explained in a manner such that the
users could understand.

- Responsibility: Accepted full responsibility for each and every task. Saw each through to
its completion.

CONCLUSION In the report, I shared various examples of solving the problems in


technology, which had been optimized for system performance. Working on these tasks
helped me improve my skills and realize how big a role organization and clarity of
communications play in IT support.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy